From CISO Marketplace — the hub for security professionals Visit

Cryptography Terms

38 terms

Advanced AES Innovations

New enhancements in the Advanced Encryption Standard designed to bolster cryptographic security.

Blockchain Privacy Layer

Privacy-focused blockchain protocol layer.

Cross-Chain Security

Protection mechanisms between different blockchains.

Crypto-Agility

The architectural capability of a system or protocol to seamlessly swap cryptographic algorithms — key exchange, signatu…

Cryptographic Key Lifecycle Management

Managing the entire lifecycle of cryptographic keys, from generation through retirement.

CRYSTALS-Dilithium

A NIST-standardized (FIPS 204) post-quantum digital signature algorithm based on lattice cryptography over module lattic…

CRYSTALS-Kyber

A NIST-standardized (FIPS 203) post-quantum key encapsulation mechanism based on the hardness of the Module Learning Wit…

Digital Certificate Lifecycle Management

Processes to securely issue, renew, and revoke digital certificates throughout their lifespan.

Drone Communication Encryption

Methods for securing the data exchanged between unmanned aerial vehicles and their controllers.

Encryption

The process of converting data into a code to prevent unauthorized access.

Encryption

The transformation of readable data (plaintext) into an unreadable format (ciphertext) using cryptographic algorithms an…

Hardware Security Module Integration

The incorporation of specialized hardware designed to securely manage digital keys and perform cryptographic operations.

Harvest Now Decrypt Later

A long-term threat strategy where adversaries collect and store encrypted data today, intending to decrypt it once suffi…

Hashing

A one-way cryptographic function that converts data of arbitrary length into a fixed-length digest; used for data integr…

Homomorphic Encryption Techniques

Cryptographic schemes that allow computations on encrypted data without needing to decrypt it first.

Key Management System

Secure generation/storage of cryptographic keys with strict access controls and rotation policies.

Key Management System (KMS)

Secure infrastructure for cryptographic key generation, storage, and rotation.

Keylogger

Malware or hardware device that records keystrokes to capture passwords, credit card numbers, and sensitive communicatio…

Lattice-Based Cryptography

A family of post-quantum cryptographic constructions whose security relies on the computational hardness of lattice prob…

NFT Security Standard

Security requirements for non-fungible tokens.

Post-Quantum Digital Signatures

Digital signature algorithms engineered to remain secure in a post-quantum computing era.

Post-Quantum Encryption

Encryption methods designed to remain secure against the computational power of quantum computers.

Privacy-Enhancing Cryptography

Advanced encryption methods for privacy protection.

Public Key Infrastructure (PKI)

System issuing/managing digital certificates for encrypted communications.

Public Key Infrastructure (PKI) Modernization

Updating digital certificate frameworks to improve trust and streamline cryptographic processes.

Quantum Cryptanalysis

The study of breaking encryption by leveraging the principles of quantum computing.

Quantum Key Distribution

Quantum-based encryption key sharing.

Quantum Key Distribution (QKD)

A secure key exchange method that uses the principles of quantum mechanics to guarantee confidentiality.

Quantum-Safe Cryptography Implementation

Methods for implementing quantum-resistant encryption.

Revocation List Optimization

Enhancing methods for maintaining and distributing certificate revocation lists for faster security updates.

Secure Multi-Party Computation

A method enabling multiple parties to compute a function collectively while keeping their individual inputs private.

Side-Channel Attack Mitigation

Techniques aimed at reducing vulnerabilities that arise from the physical implementation of cryptographic systems.

Smart Contract Security Pattern

Reusable secure contract design.

SPHINCS+

A NIST-standardized (FIPS 205) stateless hash-based post-quantum digital signature scheme that derives its security sole…

Web3 Security Framework

Structure for blockchain security implementation.

Web3 Security Token

Blockchain-based security credentials.

Web3 Wallet Security

Protection mechanisms for cryptocurrency wallets.

Zero-Knowledge Proof Protocol

Cryptographic method allowing proof of information without revealing the information itself.