Cryptographic Primitive
Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer security systems.
These routines include, but are not limited to, one-way hash functions and encryption functions.
Commonly used primitives
- Cryptographic Hash Function
- Symmetric key cryptography—compute a ciphertext decodable with the same key used to encode (e.g., AES)
- Public-Key Cryptography
- Digital signatures—confirm the author of a message
- Mix network—pool communications from many users to anonymize what came from whom
- Private information retrieval—get database information without server knowing which item was requested
- Commitment scheme—allows one to commit to a chosen value while keeping it hidden to others, with the ability to reveal it later Cryptographically secure pseudorandom number generator