Cryptography Glossary (with java insights)

  1. Plain text — The sensitive text or data that needs to be encrypted
  2. Cipher text — The text output from an encryption operation. This will also be the input to a decryption operation. It will be non-readable.
  3. Key — A single piece of data (or a corelated pair of data) use in the encryption and decryption operation.
  4. Salt — Random piece of data added to a hashing function, to increase randomness / reduce predictability
  5. Encryption — way to mask data — converting plain text to cipher text in such a way that it can be converted back when needed — 2 types : symmetric and asymmetric — refer for more details
  6. Digital Signature — way to authenticate —usually achieved via asymmetric keys — sender signs data with his private key — so receiver can verify using sender’s public key that the message was indeed sent by the right sender.
  7. Hashing — way to map data — one way mathematical function, when applied to a piece of data, will ALWAYS produce the same arbitrary set of bytes. Bytes can not be converted back to the original data.
  8. Key Alias — a human readable alias / name given to a key for reference
  1. JCA — Java Cryptography Architecture — provides cryptography engines and APIs which various JRE providers can implement
  2. JCE — Java Cryptography Extensions — default JCA provider for Oracle Java
  3. Key store — stores cryptographic keys
  4. Trust store — stores certificates
  1. Secure Random — to produce strong randoms numbers
  2. Message Digest — to produce secure hashes
  3. Signature — to produce and verify digital signatures
  4. Cipher Engine — to provide encryption operations

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Shivani Agrawal

Shivani Agrawal

A conscious soul. A keen learner. A book lover. An excited child.