You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| algorithm | Cryptographic function commonly used for data encryption, authentication, and digital signatures or other primitives. |
22
-
| certificate | An electronic document that is used to provide the identity or validate a public key. |
23
-
| protocol | A set of rules and guidelines that govern the behavior and communication with each other. |
24
-
| private-key | The confidential key of a key pair used in asymmetric cryptography. |
25
-
| public-key | The non-confidential key of a key pair used in asymmetric cryptography. |
26
-
| secret-key | A key used to encrypt and decrypt messages in symmetric cryptography. |
27
-
| key | A piece of information, usually an octet string, which, when processed through a cryptographic algorithm, process cryptographic data. |
28
-
| ciphertext | The result of encryption performed on plaintext using an algorithm (or cipher). |
29
-
| signature | A cryptographic value that is calculated from the data and a key known only by the signer. |
30
-
| digest | The output of the hash function. |
31
-
| initialization-vector | A fixed-size random or pseudo-random value used as an input parameter for cryptographic algorithms. |
32
-
| nonce | A random or pseudo-random number that can only be used once in a cryptographic communication. |
33
-
| seed | The input to a pseudorandom number generator. Different seeds generate different pseudorandom sequences.|
34
-
| salt | A non-secret value used in a cryptographic process, usually to ensure that the results of computations for one instance cannot be reused by an attacker. |
35
-
| shared-secret | A piece of data, known only to the parties involved, in a secure communication. |
| algorithm | Cryptographic function commonly used for data encryption, authentication, and digital signatures or other primitives. |
22
+
| certificate | An electronic document that provides the identity or validates a public key.|
23
+
| protocol | A set of rules and guidelines that govern the behavior and communication with each other. |
24
+
| private-key | The confidential key of a key pair used in asymmetric cryptography. |
25
+
| public-key | The non-confidential key of a key pair used in asymmetric cryptography. |
26
+
| secret-key | A key used to encrypt and decrypt messages in symmetric cryptography. |
27
+
| key | A piece of information, usually an octet string, which, when processed through a cryptographic algorithm, processes cryptographic data.|
28
+
| ciphertext | The result of encryption performed on plaintext using an algorithm (or cipher). |
29
+
| signature | A cryptographic value that is calculated from the data and a key known only by the signer. |
30
+
| digest | The output of the hash function. |
31
+
| initialization-vector | A fixed-size random or pseudo-random value used as an input parameter for cryptographic algorithms. |
32
+
| nonce | A random or pseudo-random number that can only be used once in a cryptographic communication. |
33
+
| seed | The input to a pseudo-random number generator. Different seeds generate different pseudo-random sequences. |
34
+
| salt | A value used in a cryptographic process, usually to ensure that the results of computations for one instance cannot be reused by an attacker. |
35
+
| shared-secret | A piece of data known only to the parties involved, in a secure communication. |
36
36
| tag | A message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating and integrity-checking a message. |
37
-
| additional-data | An unspecified collection of data with relevance to cryptographic activity. |
38
-
| password | A secret word, phrase, or sequence of characters used during authentication or authorization. |
39
-
| credential | Establishes the identity of a party to communication, usually in the form of cryptographic keys or passwords. |
40
-
| token | An object encapsulating a security identity. |
41
-
| other | Another type of cryptographic asset. |
42
-
| unknown | The type of cryptographic asset is not known. |
37
+
| additional-data | An unspecified collection of data with relevance to cryptographic activity. |
38
+
| password | A secret word, phrase, or sequence of characters used during authentication or authorization. |
39
+
| credential | Establishes the identity of a party to communication, usually in the form of cryptographic keys or passwords. |
40
+
| token | An object encapsulating a security identity. |
41
+
| other | Another type of cryptographic asset. |
42
+
| unknown | The type of cryptographic asset is not known. |
0 commit comments