This class was created by Brainscape user E Mi. Visit their profile to learn more about the creator.

By: E Mi

Decks in this class (15)

Introduction
Define security,
What are assets,
What is a vulnerability
46  cards
Number theory, groups and finite fields
How can we denote that a divides b,
What is trivial division,
Properties of factors
30  cards
Classical encryption
What is cryptography,
What is cryptoanalysis,
What is secret writing
55  cards
Hill cipher, stream ciphers and the One Time Pad
What is the hill cipher,
What is a weakness of the hill ci...,
Do a cryptanalysis of the hill ci...
16  cards
Block ciphers, DES and AES
What are 2 widely deployed block ...,
Wha are block ciphers,
What is the encryption technique ...
48  cards
Modes of operation and random numbers
What is the purpose of having mul...,
What is one thing that confidenti...,
What does randomised encryption s...
40  cards
Hash functions, MACs and authenticated encryption
What are hash functions,
What are macs,
What does authenticated encryptio...
59  cards
Number theory for Public key Cryptography
What is the chinese remainder the...,
What does it mean to be pairwise ...,
Define the euler function
35  cards
Public key cryptography and RSA
What is a one way function,
Name 2 one way functions,
What is a trap door one way function
34  cards
Public key cryptosystems based on Discrete logarithms
How does the diffie hellman key e...,
Example in z_p,
Define the security of diffie hel...
26  cards
Digital signatures
How does mac provide integrity an...,
How does digital signatures obtai...,
How does digital signature provid...
39  cards
Key establishment and certificates
What is key establishment,
What does key establishment in tl...,
What phases does key management c...
68  cards
The transport layer security protocol (TLS)
What is tls,
What is tls often used for,
What 3 higher level protocols doe...
69  cards
TLS 1.3 and IPsec
What is tls 13,
What is ipsec,
What are the 7 layers of the osi ...
65  cards
Email security and secure messaging
What does mua stand for,
What does mua stand for,
What does mua stand for
55  cards

More about
Cryptography

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study E Mi's Cryptography flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Cryptography
  • 14 decks
  • 237 flashcards
  • 37 learners
Decks: Lecture 1, Lecture 2 Stream Ciphers, Lecture 3 Block Ciphers Des, And more!
CryptoGraphy
  • 19 decks
  • 228 flashcards
  • 2 learners
Decks: 1 Intro, 1 Classical Symmetric Algorithms, 2 Stream Ciphers, And more!
Cryptography
  • 11 decks
  • 75 flashcards
  • 49 learners
Decks: Asymmetric Ciphers, Symmetric Ciphers, Block Cipher Modes, And more!
C839 Cryptography
  • 6 decks
  • 468 flashcards
  • 15 learners
Decks: Module 1 History Of Cryptography, Module 2 Applications Of Cryptography, Module 3 Number Theory And Asymmetric Cr, And more!
Make Flashcards