Encryption-and-Key-Management

Symmetric Encryption with Shared Keys
Encryption that uses one shared secret for both encryption and decryption, making key control central to safety.
Asymmetric Encryption with Key Pairs
Encryption that uses public and private key pairs so trust is possible without sharing one secret key.
Public Key Infrastructure
Public key infrastructure is the trust framework that manages key pairs, certificates, and authorities so systems can verify identity and establish trust.
Certificate Authority
A certificate authority issues and signs certificates that other systems may trust as part of a public key infrastructure.
Key Rotation for Cryptographic Safety
Key rotation is the practice of replacing cryptographic keys on a defined schedule or when risk changes so long-lived exposure is reduced.
Hashing for Integrity and Verification
Hashing transforms input data into a fixed-length digest used for integrity checks, comparison, and secure password-storage workflows.
Transport Layer Security (TLS)
TLS is the protocol family widely used to protect data in transit by authenticating endpoints and establishing encrypted communication.
Perfect Forward Secrecy in TLS
Perfect forward secrecy helps ensure that compromise of a long-term key does not automatically expose past encrypted sessions.
Key Escrow for Recovery Access
Key escrow is the practice of storing a recoverable copy of a cryptographic key with a trusted authority or process.
Hardware Security Modules for Key Protection
A hardware security module is a dedicated device or managed service designed to protect cryptographic keys and perform sensitive cryptographic operations.
Certificate Revocation in PKI
Certificate revocation is the process of marking a certificate as no longer trustworthy before its normal expiration date.
Online Certificate Status Protocol
The Online Certificate Status Protocol is a way for systems to check whether a certificate has been revoked without relying only on expiration dates.
Salting for Password Storage
Salting is the practice of adding unique random data to a value before hashing it so identical inputs do not produce the same stored result.
Mutual TLS
Mutual TLS is a form of TLS in which both sides of a connection authenticate with certificates instead of only the server doing so.
Envelope Encryption for Scalable Key Control
Envelope encryption is a design where data is encrypted with one key and that key is then protected with another key used for stronger centralized control.
Certificate Transparency for Trust Visibility
Certificate Transparency is a public certificate-logging approach that makes certificate issuance easier to observe and investigate when unexpected trust events occur.
Certificate Pinning for Client Trust
Certificate pinning is a trust restriction that tells an application to accept only specific certificates or public keys for a destination instead of relying on the full public trust store alone.
Secure Transport for Data in Transit
Secure transport is the broader practice of protecting data while it moves between systems so communication remains confidential, intact, and appropriately authenticated.