![](https://static.wixstatic.com/media/nsplsh_4658467a2d73573075776f~mv2_d_5760_3840_s_4_2.jpg/v1/fill/w_980,h_653,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/nsplsh_4658467a2d73573075776f~mv2_d_5760_3840_s_4_2.jpg)
![](https://static.wixstatic.com/media/1cce54_380262ecca914c7a8ca0c68d1ddd60ca~mv2.png/v1/fill/w_980,h_657,al_c,q_90,usm_0.66_1.00_0.01,enc_auto/1cce54_380262ecca914c7a8ca0c68d1ddd60ca~mv2.png)
Encryption turns plaintext into ciphertext
Steganography hides information within other information
Perfect Forward Secrecy Random Asymmetric keys used for each transaction
Symmetric Uses single key, can encrypt large amouts of data quickly (large amounts of data)
Asymmetric Uses 2 keys, private & public (small amounts of data)
S/MIME Secure/Multipurpose Internet Mail Exchange - Asymmetric
Diffie-Hellman Asymmetric.secure tunnel for symetic data Used by Internet Key Exchange (IKE) UDP port 500
XOR Exclusive OR , output is comparison of 2 bits
Stream cipher Applies encryption to one bit at a time
Block cipher Encrypts entire block of data such as 128 bits at a time
PRNG Pseudo-Random Number Generator
Nonce Often a random number that is used only once
3 types of data encryption. At Rest / In Flight / In Use
Encryption supports Confidentiality
Integrity
Non-Repudiation
Resiliency
Authentication
Comentários