Skip to content

Terms

links: Index


NIST Glossary

  • The NIST maintains a comprehensive cybersecurity glossary: NIST Glossary
  • Check actual recommendations for key length on Keylenght.com

AC1

Cryptographic Hash Functions

  • SHA-1 (Merkle–Damgård construction)
  • SHA-2 (Merkle–Damgård construction)
  • SHA-3 (Sponge construction / Keccak)
  • BLAKE (ChaCha)

KDF (Key Derivation Function)

MAC (Message Authentication Code)

  • CBC-MAC (Block cipher based)
  • HMAC (Hash-and-Mac based)
  • Poly1305 & GMAC (Based on a universal hash family)
  • KMAC (Based on Keccak. Also usable as a regular hash function without key)

AEAD (Authenticated Encryption and Associated Data)

XOF (Extended Output Function)

Random

  • PRG (Pseudo Random Generator)
  • PRNG (Pseudo Random Number Generator)
    • Subset of PRG. Used interchangeably.
  • CSPRNG (Cryptographically secure pseudorandom number generator)
    • A PRNG that is safe for cryptographic use. (Assuming the seed is picked correctly)
  • PRF (Pseudo Random Function)
  • RNG (Random Number Generator)
    • Some mechanism that produces random numbers
  • TRNG (True Random Number Generator)
    • An RNG that is based off of some unpredictable physical process.

IND-CPA

IND-CCA

Naming Systems

Secure Channel

Key Establishing

Key Revocation

Key Management

AC2

Math

Notation Description
\(\mathbb{Z}_n\) Set of integers modulo n, called the ring of integers modulo \(n\). Consists of the integers \(\{0, 1, 2, ..., n-1\}\)
Additive group \((\mathbb{Z}_n, +_n, −_n, 0)\)
\(\mathbb{Z}_n^*\) Multiplicative group \((Z^∗_n, \times_n,^{−1} ,1)\)
\(G_q ⊂ Z^∗_p\) Subgroup \(G_q\) (If \(p\) and \(q\) are used prime numbers are implied)
\(G\) / \(\mathcal{G}\) Group notation \(\mathcal{G} =(G,◦,inv,e)\)
\(F\) / \(\mathcal{F}\) Field notation \(\mathcal{F} = (F,+,−,0,×,^{−1} ,1)\)
\(E_{a,b}(F)\) Elliptic curve over a field with curve parameters \(a\) and \(b\)
  • Generators: {\(3,4,9,16\)} are always a generator

Adversary Model / Security Model

  • in Public-Key cryptography, CPA-Security is the minimum (PK is public!)
    • CCA1 (non-adaptive): adversary gets \(c\) after asking oracle
    • CCA2 (adaptive): adversary get \(c\) before asking oracle

pk-security-models.png

Public-key cryptosystems

Certificates

  • X.509 (Format of public key certificates)
  • CA (Certification Authority)
  • OCSP (Online Certificate Status Protocol)
  • DANE (DNS-Based Authentication of Named Entities)
  • DNSSEC
  • HPKP (HTTP Public Key Pinning)
  • HSTS (HTTP Strict Transport Security)

Secure Channels / Messaging

Anonymity

Decentralisation

  • GPG (GNU Privacy Guard)
  • Trust Model (TOFU, Web of Trust, Hierarchical Trust)
  • Fog of Trust (Secure Web of Trust)
  • DHT (Distributed Hash Tables and different approaches)
  • GNS (GNU Name System)
  • GNUnet

Taler

Offtopic


links: Index

Distributed Systems / Bitcoin

Web

Protocols and Applications