Fermat's Little Theorem states that if p is a prime number, then for any integer a not divisible by p, the number a^(p-1) - 1 is an integer multiple of p. 5. Private Key Cryptography vs Public Key Cryptography ● Private Key Cryptography: ○ Uses a single key for both encryption and decryption. ○ Key must be securely shared between sender and receiver. ○ Faster than public-key cryptography. ○ Examples: AES, DES ● Public Key Cryptography: ○ Uses a pair of keys: a public key for encryption and a private key for decryption. ○ Public key can be shared with anyone, while the private key is kept secret. ○ Slower than private-key cryptography. ○ Examples: RSA, Diffie-Hellman 6. RSA Algorithm vs SHA ● RSA: ○ Asymmetric encryption algorithm. ○ Used for digital signatures and secure communication. ○ Relies on the difficulty of factoring large numbers. ● SHA: ○ Cryptographic hash function. ○ Used for data integrity and message authentication. ○ Produces a fixed-size hash value from input data. 7. MAC vs Hash ● MAC (Message Authentication Code): ○ A cryptographic technique that combines a secret key with a message to produce a fixed-size tag. ○ Used for both data integrity and authentication. ● Hash: ○ A mathematical function that maps input data to a fixed-size output. ○ Used for data integrity and message authentication. 8. Mathematics Behind ElGamal Cryptosystem The ElGamal cryptosystem relies on the difficulty of the discrete logarithm problem in a finite field. It involves operations in a finite field, such as modular exponentiation and multiplication. 9. Applications of X.509 X.509 is a standard for public key infrastructure (PKI). Its applications include: ● Secure communication (SSL/TLS) ● Digital certificates for authentication ● Secure email ● E-commerce 10. Requirements of Kerberos Kerberos requires the following components: ● Key Distribution Center (KDC): Issues tickets and keys. ● Authentication Server (AS): Authenticates users and issues tickets. ● Ticket Granting Server (TGS): Issues tickets for specific services. ● Client and Server: Entities that communicate securely. 11. Information Security Information security is the practice of protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. 12. Cybercrime Cybercrime refers to criminal activities that involve computers and networks, such as hacking, phishing, and identity theft. 13. Cybersecurity Cybersecurity is the practice of protecting computer systems and networks from digital attacks. It involves a range of technologies and processes designed to prevent, detect, and respond to cyber threats. 14. Spyware Spyware is software that collects information about a user's activities without their knowledge or consent. It can be used to track browsing habits, steal passwords, and monitor keystrokes. 15. Key Practices for Cloud Security Key practices for cloud security include: ● Strong access controls and identity management ● Data encryption ● Regular security audits and vulnerability assessments ● Network security measures ● Incident response planning ● Regular software updates and patching ● https://brainly.in/question/57477284 ● https://facts.net/mathematics-and-logic/mathematical-sciences/7-facts-you-must-know-ab out-fermats-little-theorem/ ● https://www.bavinfosec.com/faq ● https://en.wikipedia.org/wiki/Federal_Information_Security_Management_Act_of_2002