Cryptography
Appearance
Cryptography is the process of converting ordinary text into unintelligible text and vice-versa. It is used to store and transmit data so that only those intended can read and process it. Cryptography protects data from theft or alteration and authenticates users.[1]
Trust
An entity trusts another entity when the first one makes the assumption that the second one will behave exactly as the first entity expects.[2] Trust is predictability. Identification, authentication, accountability, authorization, and availability support confidence in predictability. Trust is a set of binary relationships based on individual identity or unique characteristic validation.[3]
- In computer science, trust refers to the generation of authorities or user access/privileges through cryptography.
- Zero Trust (ZT) is a cybersecurity paradigm concerned with moving defenses from static, network-based perimeters to a focus on users, assets, and resources.[4]
- Cryptocurrencies use proof of work (PoW) to achieve trust.
- Trusted certificates create secure connections to a server via the Internet.
- Trusted Notifiers
Keys
- public keys