# Conventional Encryption Model

This is a mind map that contains information about the conventional encryption model.

This is a mind map that contains information about the conventional encryption model.

Tags:

Similar Mind Maps

Outline

Conventional Encryption Model

Public key

Application for publickeycryptosystem

Encryption/decryption

Digital signature

Key exchange

Examples of publickey cryptosystem

Elgamal

RSA

Cryptographic attack methoods

Plaintext based attacks

Known plaintext

Chosen plaintext

Adaptive chosen plaintext

Ciphertext based attacks

Ciphertext only

Chosen ciphertext

Adaptive chose ciphertext

Man in the middle attack

make it seem that two computers arecommunication with each other.

conventional encryption algorithm

Encryption ingredients

Plaintext

Encryption algorithm

Secret key

Ciphertext

Decryption algorithm

Source use of symmetric encryption

A strong encryption algorihm

A secret key known only to sender/reciver

Conventional Encryption Model

Conventional Encryption Model

Public key

Application for publickey

cryptosystem

Encryption/decryption

Digital signature

Key exchange

Examples of publickey cryptosystem

Elgamal

RSA

conventional encryption algorithm

Encryption ingredients

Plaintext

Encryption algorithm

Secret key

Ciphertext

Decryption algorithm

Source use of symmetric encryption

A strong encryption algorihm

A secret key known only to sender/reciver

Cryptographic attack methoods

Plaintext based attacks

Known plaintext

Chosen plaintext

Adaptive chosen plaintext

Ciphertext based attacks

Ciphertext only

Chosen ciphertext

Adaptive chose ciphertext

Man in the middle attack

make it seem that two computers are

communication with each other.

Conventional Encryption Model

Public key

Application for publickeycryptosystem

Encryption/decryption

Digital signature

Key exchange

Examples of publickey cryptosystem

Elgamal

RSA

Cryptographic attack methoods

Plaintext based attacks

Known plaintext

Chosen plaintext

Adaptive chosen plaintext

Ciphertext based attacks

Ciphertext only

Chosen ciphertext

Adaptive chose ciphertext

Man in the middle attack

make it seem that two computers arecommunication with each other.

conventional encryption algorithm

Encryption ingredients

Plaintext

Encryption algorithm

Secret key

Ciphertext

Decryption algorithm

Source use of symmetric encryption

A strong encryption algorihm

A secret key known only to sender/reciver

Mind Map

Outline

1

Page-1

1

Page-1

This work was published by EdrawMind user Study Smarter and does not
represent the position of Edraw Software.

100%