Public Key
A cryptographic key that can be shared publicly and is used to encrypt data or verify (decrypt) digital signatures. It’s part of a pair with a private key.
Private Key
A cryptographic key that is kept secret and is used to decrypt data or create (encrypt) digital signatures. It’s part of a pair with a public key.
Key Escrow
A process where encryption keys are stored securely by a third party, allowing access under certain conditions, often used in government, legal, or corporate environments.
* There’s not actually a good / secure way to carry this out
Full-disk Encryption
Encrypts the entire disk, including the operating system, ensuring that all data is protected when the system is powered off.
Partition Encryption
Encrypts specific partitions on a disk, allowing selective protection of sensitive data without encrypting the entire disk.
File Encryption
Encrypts individual files, providing flexibility to protect only specific documents or files as needed.
Volume Encryption
Encrypts a storage volume, which can contain multiple partitions or logical drives, providing protection for a larger data set than file encryption.
Database Encryption
Encrypts data within a database, protecting sensitive information stored in structured formats from unauthorized access.
Record Encryption
Encrypts specific records within a database, allowing granular protection of individual data entries.
Transport/Communication Encryption
Encrypts data in transit, protecting it from interception or tampering as it moves across networks. Examples: SSL/TLS, HTTPS.
Asymmetric Encryption
Encryption that uses a pair of keys—a public key for encryption and a private key for decryption—offering secure key exchange and authentication
* Sender encrypts message using recipient’s public key, recipient decrypts the message using their private key
* security is based upon the difficulty of solving extremely complex math problems
Symmetric Encryption
Encryption that uses a single key for both encryption and decryption, providing faster performance but requiring secure key management.
Key Exchange
Algorithms
Mathematical formulas used to encrypt and decrypt data. Examples include AES, RSA, and SHA-256.
Key Length
The size of a cryptographic key, typically measured in bits, which determines the strength of the encryption. Longer keys provide stronger security.
TPM
Trusted Platform Module
* A hardware-based security chip that provides secure storage and processing of cryptographic keys, enhancing platform integrity.
HSM
Hardware Security Module
* A physical device that manages cryptographic keys and performs cryptographic operations
* provides a higher level of security and performance for key management and operations.
Key Management System
A system or software that manages cryptographic keys throughout their lifecycle, including generation, storage, distribution, and destruction.
Secure Enclave
A secure area within a processor that provides isolated and protected execution of security-sensitive operations, often used in mobile devices.
Steganography
The practice of hiding data within other non-secret data, such as embedding a message in an image, video, or audio file, to avoid detection.
* hide the fact that you are even communicating in the first place
Tokenization
Replacing sensitive data with non-sensitive tokens that can be mapped back to the original data through the use of a relational database (which itself must be kept secure)
Data Masking
The process of obscuring specific data within a dataset to protect it, often used in non-production environments to prevent unauthorized access to sensitive information.
Hashing
The irreversible process of converting an input of any size into a fixed-size string of characters, which represents the data uniquely. Used for integrity verification. Examples: SHA-256, MD5.
Salting
Adding random data to a hash input to prevent attackers from using precomputed hash values (rainbow tables) to crack passwords.