Digital signature/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Housekeeping Bot m (Automated edit: Adding CZ:Workgroups to Category:Bot-created Related Articles subpages) |
No edit summary |
||
(One intermediate revision by one other user not shown) | |||
Line 25: | Line 25: | ||
{{r|Man-in-the-middle attack}} | {{r|Man-in-the-middle attack}} | ||
{{r|Pretty Good Privacy}} | {{r|Pretty Good Privacy}} | ||
{{r|RSA}} | {{r|RSA algorithm}} | ||
{{Bot-created_related_article_subpage}} | {{Bot-created_related_article_subpage}} | ||
<!-- Remove the section above after copying links to the other sections. --> | <!-- Remove the section above after copying links to the other sections. --> | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Domain Name System security}} | |||
{{r|Politics of cryptography}} | |||
{{r|Cryptographic key}} |
Latest revision as of 11:00, 7 August 2024
- See also changes related to Digital signature, or pages that link to Digital signature or to this page or whose text contains "Digital signature".
Parent topics
Subtopics
Bot-suggested topics
Auto-populated based on Special:WhatLinksHere/Digital signature. Needs checking by a human.
- Asymmetric key cryptography [r]: A category of cryptographic techniques, which greatly simplify key management, which are based on mathematically related key pairs, such that the "public" key can be used to encrypt and be freely available, and only the holder of the "private" key can decrypt the message [e]
- Cryptographic key [r]: Value used by a computer together with a complex algorithm to encrypt and decrypt messages. [e]
- Cryptography controversy [r]: The "crypto wars", political controversies and legal cases involving the use of cryptography. [e]
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Digital certificate [r]: A means by which the user of a public key can obtain it from a central repository, with high confidence that key is correct and has not been revoked [e]
- Email [r]: A method of composing, sending, storing, and receiving messages over electronic communication systems. [e]
- Hash (cryptography) [r]: An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
- History of cryptography [r]: The development, since antiquity, of means of concealing communications from other than the intended recipient [e]
- IPsec [r]: Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets. [e]
- Man-in-the-middle attack [r]: An attack on a communications system in which the attacker deceives the communicating parties so they both talk to him while believing they are talking to each other. [e]
- Pretty Good Privacy [r]: E-mail encryption package created by Phillip Zimmerman. [e]
- RSA algorithm [r]: A widely used public key encryption algorithm whose strength depends on the difficulty of integer factorisation. [e]
- Domain Name System security [r]: A set of extensions to the Domain Name System to protect it from security threats known at the time [e]
- Politics of cryptography [r]: Add brief definition or description
- Cryptographic key [r]: Value used by a computer together with a complex algorithm to encrypt and decrypt messages. [e]
Categories:
- Subpages
- Related Article Subpages
- Computers Related Article Subpages
- Mathematics Related Article Subpages
- Law Related Article Subpages
- All Content
- Computers Content
- Mathematics Content
- Law Content
- Security tag
- Bot-created Related Articles subpages
- Computers Bot-created Related Articles subpages
- Mathematics Bot-created Related Articles subpages
- Law Bot-created Related Articles subpages