CyberBolt
4 Terms

Cybersecurity Glossary

Essential cybersecurity terminology explained in plain language. From fundamentals to advanced concepts.

4 terms found in Cryptography

Clear filters

C

Cryptographic Hash

Cryptography

A one-way function that converts input data into a fixed-size string. Used for password storage (bcrypt, Argon2), file integrity verification (SHA-256), and digital signatures. Cannot be reversed.

E

Encryption

Cryptography

The process of converting plaintext data into ciphertext using an algorithm and key, making it unreadable without the decryption key. Types: symmetric (AES), asymmetric (RSA), and at-rest vs in-transit.

H

Hash Collision

Cryptography

When two different inputs produce the same hash output. Collision attacks can compromise hash-based systems. MD5 and SHA-1 are vulnerable; SHA-256 and SHA-3 are collision-resistant.

T

TLS/SSL

Cryptography

Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL) are cryptographic protocols that provide secure communication over networks. HTTPS = HTTP + TLS. Uses certificates for server authentication.

Want to go deeper?

Read our in-depth articles that explain these concepts with real-world examples and code.

Browse Articles →
Cybersecurity Glossary — CyberBolt | CyberBolt