Symmetric vs asymmetric. Hashing. Public key infrastructure (PKI). Cara matematis lindungi data.
Ilmu mengamankan komunikasi dari pihak ketiga. Sudah ada sejak Yunani kuno (Caesar cipher). Modern: matematis kompleks. Tujuan: confidentiality, integrity, authentication.
Kunci sama untuk encrypt dan decrypt. Cepat tapi sulit distribusi key. Algoritma: AES (standar), 3DES (legacy). Use case: enkripsi file, database, harddisk full disk encryption.
Pasangan kunci: public dan private. Encrypt dengan public, decrypt dengan private. Slower tapi solve key distribution. Algoritma: RSA, ECC. Use case: SSL/TLS, signing, key exchange.
One-way function. Output fixed length. Sama input = sama output. Sedikit ubah input = output beda total (avalanche effect). Algoritma: SHA-256, SHA-3. Use case: password storage (dengan salt), integrity check.
Public Key Infrastructure. Certificate Authority (CA) verifikasi identitas dan tanda tangan public key. Browser percaya CA root. Saat akses HTTPS, browser cek certificate. Pondasi internet aman.