Difference between revisions of "Cryptography"
Jump to navigation
Jump to search
(→Trust) |
(→Trust) |
||
Line 2: | Line 2: | ||
==Trust== | ==Trust== | ||
+ | * In computer science, trust refers to the generation of authorities or user access/privileges through cryptography. | ||
* [[Zero Trust]] (ZT) is a cybersecurity paradigm concerned with moving defenses from static, network-based perimeters to a focus on users, assets, and resources.<ref>[https://csrc.nist.gov/publications/detail/sp/800-207/final SP 800-207, NIST]</ref> | * [[Zero Trust]] (ZT) is a cybersecurity paradigm concerned with moving defenses from static, network-based perimeters to a focus on users, assets, and resources.<ref>[https://csrc.nist.gov/publications/detail/sp/800-207/final SP 800-207, NIST]</ref> | ||
+ | * [[Cryptocurrency|Cryptocurrencies]] use proof of work (PoW) to achieve trust. | ||
+ | * Trusted certificates create secure connections to a server via the Internet. | ||
+ | * [[Trusted Notifiers]] | ||
+ | |||
+ | ==Keys== | ||
+ | * public keys | ||
==Cryptographic Technologies== | ==Cryptographic Technologies== |
Revision as of 13:57, 10 August 2021
Cryptography is the process of converting ordinary text into unintelligible text and vice-versa. It is used to store and transmit data so that only those intended can read and process it. Cryptography protects data from theft or alteration and authenticates users.[1]
Trust
- In computer science, trust refers to the generation of authorities or user access/privileges through cryptography.
- Zero Trust (ZT) is a cybersecurity paradigm concerned with moving defenses from static, network-based perimeters to a focus on users, assets, and resources.[2]
- Cryptocurrencies use proof of work (PoW) to achieve trust.
- Trusted certificates create secure connections to a server via the Internet.
- Trusted Notifiers
Keys
- public keys