Ayo Secu

  • 홈
  • 태그
  • 방명록

AES-GCM 1

Ciphers

CiphersCiphers are the algorithms used to encrypt and decrypt data. They fall into two main categories: block ciphers and stream ciphers. The method by which block ciphers handle data is influenced by different modes of operation. Below is an overview of each type, how they differ, and details on AES-GCM, a popular mode of operation for block ciphers.1. Block Ciphers vs. Stream CiphersBlock Ciph..

Security Terms/Cryptography, Authentication, Identity 2025.01.25
이전
1
다음
더보기
  • 분류 전체보기 (144)
    • Security Terms (144)
      • Threat Modeling (5)
      • Attack Structure (14)
      • Exploits (5)
      • Detection (11)
      • Incident Management (6)
      • Digital Forensics (7)
      • Network Security (35)
      • Web Application (22)
      • Cryptography, Authenticatio.. (8)
      • Infrastructure Virtualizati.. (9)
      • OS Implementation and Syste.. (8)
      • Mitigations (10)
      • Malware Reversing (4)

Tag

forensic, Authentication, Detection, security, infrastructure virtualization, threat modeling, Digital Forensics, NETWORK SECURITY, network, os implementation, systems, cybersecurity, security terms, attack structure, incident management, mitigations, Cryptography, web application, Exploit, identity,

Copyright © Kakao Corp. All rights reserved.

티스토리툴바