Cybersecurity Glossary
Essential cybersecurity terminology explained in plain language. From fundamentals to advanced concepts.
4 terms found in Cryptography
Clear filtersC
Cryptographic Hash
CryptographyA one-way function that converts input data into a fixed-size string. Used for password storage (bcrypt, Argon2), file integrity verification (SHA-256), and digital signatures. Cannot be reversed.
E
Encryption
CryptographyThe process of converting plaintext data into ciphertext using an algorithm and key, making it unreadable without the decryption key. Types: symmetric (AES), asymmetric (RSA), and at-rest vs in-transit.
H
Hash Collision
CryptographyWhen two different inputs produce the same hash output. Collision attacks can compromise hash-based systems. MD5 and SHA-1 are vulnerable; SHA-256 and SHA-3 are collision-resistant.
T
TLS/SSL
CryptographyTransport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL) are cryptographic protocols that provide secure communication over networks. HTTPS = HTTP + TLS. Uses certificates for server authentication.
Want to go deeper?
Read our in-depth articles that explain these concepts with real-world examples and code.
Browse Articles →