Jump to content

Cryptography: Difference between revisions

From ICANNWiki
Jessica (talk | contribs)
Jessica (talk | contribs)
Line 2: Line 2:


==Trust==
==Trust==
An entity trusts another entity when the first one makes the assumption that the second one will behave exactly as the first entity expects.<ref>[https://www.itu.int/dms_pubrec/itu-t/rec/x/T-REC-X.509-201910-I!!SUM-HTM-E.htm ITU-T x.509]</ref> Trust is predictability. Identification, authentication, accountability, authorization, and availability support confidence in predictability. Trust is a set of binary relationships based on individual identity or unique characteristic validation.<ref>[https://www.informit.com/articles/article.aspx?p=31546 Defining Trust, "Trust Modeling for Security Architecture Development," ''InformIT'']</ref>
* In computer science, trust refers to the generation of authorities or user access/privileges through cryptography.
* In computer science, trust refers to the generation of authorities or user access/privileges through cryptography.
* [[Zero Trust]] (ZT) is a cybersecurity paradigm concerned with moving defenses from static, network-based perimeters to a focus on users, assets, and resources.<ref>[https://csrc.nist.gov/publications/detail/sp/800-207/final SP 800-207, NIST]</ref>
* [[Zero Trust]] (ZT) is a cybersecurity paradigm concerned with moving defenses from static, network-based perimeters to a focus on users, assets, and resources.<ref>[https://csrc.nist.gov/publications/detail/sp/800-207/final SP 800-207, NIST]</ref>

Revision as of 14:13, 10 August 2021

Cryptography is the process of converting ordinary text into unintelligible text and vice-versa. It is used to store and transmit data so that only those intended can read and process it. Cryptography protects data from theft or alteration and authenticates users.[1]

Trust

An entity trusts another entity when the first one makes the assumption that the second one will behave exactly as the first entity expects.[2] Trust is predictability. Identification, authentication, accountability, authorization, and availability support confidence in predictability. Trust is a set of binary relationships based on individual identity or unique characteristic validation.[3]

  • In computer science, trust refers to the generation of authorities or user access/privileges through cryptography.
  • Zero Trust (ZT) is a cybersecurity paradigm concerned with moving defenses from static, network-based perimeters to a focus on users, assets, and resources.[4]
  • Cryptocurrencies use proof of work (PoW) to achieve trust.
  • Trusted certificates create secure connections to a server via the Internet.
  • Trusted Notifiers

Keys

  • public keys

Cryptographic Technologies

Post-Quantum Cryptography

References