Cryptographic Primitives
Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer security systems. These routines include, but are not limited to, one-way hash functions and encryption functions.
Commonly used primitives
- One-way hash function
- sometimes also called as one-way compression function—compute a reduced hash value for a message (e.g., SHA-256)
- Symmetric key cryptography
- compute a ciphertext decodable with the same key used to encode (e.g., AES)
- Public-key cryptography
- compute a ciphertext decodable with a different key used to encode (e.g., RSA)
- Digital signatures
- confirm the author of a message
- Mix network
- pool communications from many users to anonymize what came from whom
- Private information retrieval
- get database information without server knowing which item was requested
- Commitment scheme
- allows one to commit to a chosen value while keeping it hidden to others, with the ability to reveal it later
- Cryptographically secure pseudorandom number generator