Statements (57)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Cryptography
|
gptkbp:hasFacility |
Secure communication
|
https://www.w3.org/2000/01/rdf-schema#label |
Cryptographic Systems
|
gptkbp:includes |
Encryption
Decryption Hash functions Digital_signatures |
gptkbp:isBasedOn |
Mathematical_theory
|
gptkbp:isChallengedBy |
User behavior
Ethical concerns Legal issues Technological limitations |
gptkbp:isEnhancedBy |
Cryptographic protocols
Key management systems Public_key_infrastructure_(PKI) |
gptkbp:isEvaluatedBy |
Penetration testing
Security audits |
gptkbp:isInfluencedBy |
gptkb:Quantum_computing
Regulatory requirements Advancements in computing power Public perception of privacy |
gptkbp:isLocatedIn |
Software
Hardware |
gptkbp:isPartOf |
Data protection
Information security Cloud security Network security Mobile security IoT security |
gptkbp:isRegulatedBy |
Standards organizations
|
gptkbp:isSupportedBy |
Government agencies
Research institutions Private sector companies Open-source communities |
gptkbp:isTaughtIn |
Computer science courses
Mathematics courses Cryptography courses Law courses Information security courses |
gptkbp:isUsedFor |
Asymmetric cryptography
Brute force attacks Man-in-the-middle attacks Symmetric cryptography Side-channel attacks Replay_attacks |
gptkbp:isUsedIn |
Authentication
Blockchain technology Data integrity Virtual private networks (VPNs) Secure data transmission Secure email Secure web browsing (HTTPS) Digital_currencies |
gptkbp:isUtilizedFor |
Cybersecurity
|
gptkbp:isVisitedBy |
Cryptographers
|
gptkbp:isVulnerableTo |
Cryptanalysis
|
gptkbp:uses |
Mathematical_algorithms
|