Hash (cryptography)/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris |
imported>Sandy Harris |
||
Line 6: | Line 6: | ||
{{r|Information security}} | {{r|Information security}} | ||
{{r|Cryptography}} | {{r|Cryptography}} | ||
{{r|Error control}} | {{r|Error control}} | ||
{{r|Hybrid cryptosystem}} | |||
==Subtopics== | ==Subtopics== | ||
{{r|Message Digest 5}} | {{r|Message Digest 5}} |
Revision as of 02:42, 30 November 2008
- See also changes related to Hash (cryptography), or pages that link to Hash (cryptography) or to this page or whose text contains "Hash (cryptography)".
Parent topics
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Error control [r]: In computing and telecommunications, the detection and appropriate response to errors in digital information; the response can be ignoring or attempting to correct the error [e]
- Hybrid cryptosystem [r]: A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well. [e]
Subtopics
- Advanced Encryption Standard [r]: A US government standard issued in 2002 for a stronger block cipher to succeed the earlier Data Encryption Standard. [e]
- Digital signature [r]: A technique based on public key cryptography to allow people to "sign" documents using their private keys. [e]
- Checksum [r]: Add brief definition or description