Overview#
Algorithm is a procedure or formula for solving a problem, based on conducting a sequence of specified actions.Algorithm has no formal and precise definition, however, for our purposes an Algorithm is an abstract concept that describes how to solve a problem.
Algorithm as an abstraction of a Function where the steps are defined. but, the method of performing the steps are NOT defined.
Algorithm Implementations are referred to as a Function
Machine Learning Algorithms [1]#
Machine Learning Algorithms are described as learning a target function (f) that best maps input variables (X) to an output variable (Y).Y = f(X)
This is a general learning task where we would like to make predictions in the future (Y) given new examples of input variables (X).
We don’t know what the function (f) looks like or it’s form. If we did, we would use it directly and we would not need to learn it from data using machine learning algorithms.
Cryptographic Algorithm#
Cryptographic Algorithm is a Algorithm and referred to as a Cipher which is typically connected to a Cipher SuiteRandomized algorithm#
More Information#
There might be more information for this subject on one of the following:- 2.16.840.1.113730
- AD Determining Password Expiration
- ARIA
- Ad Hoc network
- Alg
- Ambiguous Name Resolution
- Artificial Intelligence
- Asymmetric Key Cryptography
- Asymmetric Key Packages
- At_hash
- Authenticated Encryption
- Authenticated Encryption with Associated Data
- Backpropagation
- Best Practices OpenID Connect
- Bias error
- Biometric Comparison
- Biometric Sample Processing
- Bitcoin Diamond
- Bitcoin block
- Bitcoin network genesis block
- Block Cipher Mode
- CALG_RC4
- CHACHA20-POLY1305
- Cache replacement algorithms
- Certificate Algorithm ID
- Certificate Signature Algorithm
- Cipher
- Cipher Suite
- Cipher-based Message Authentication Code
- Classification
- Classification Trees
- Classification and Regression Trees
- Classifier
- Client Secret
- Cluster analysis
- Collision Resistance
- Complexity
- Computational Hardness Assumption
- Computational complexity
- Computing
- Concurrency
- Cryptanalysis
- Cryptographic Algorithm
- Cryptographic Key
- Cryptographic Primitive
- Cryptosystem
- Decentralized Identifier
- Decision Tree
- Deep Learning
- Diffie-Hellman
- Diffie-Hellman or RSA
- Digital Key
- Digital Signature Algorithm
- Distributed Ledger Technology
- DomainKeys Identified Mail
- Double Ratchet Algorithm
- EAX
- ES256
- Enc
- Encryption
- Encryption Scheme
- Enhanced Privacy ID
- FALLOUT
- FIPS 180
- FLAIM
- False Non-Match Rates
- Forest functional levels
- Function
- Galois-Counter Mode
- Gradient descent
- HOTP
- Hash Function
- Homomorphic Encryption
- Hyperledger
- Hyperparameters
- Id_token_encrypted_response_alg
- Id_token_signed_response_alg
- Idempotent
- Implementation
- JSON Web Algorithms
- JSON Web Encryption
- JSON Web Signature
- JWK Set
- Javascript Object Signing and Encryption
- K-Nearest Neighbor
- Kerckhoffs principle
- Key
- Key Generation
- Key Management
- Key size
- Key wrapping
- KeyUsage
- Keyed-Hash Message Authentication Code
- LM hash
- Las Vegas algorithm
- Length extension attack
- Linear transformation
- Logjam
- Luhn Algorithm
- Machine Learning
- Machine Learning Algorithms
- MapReduce
- MapiID
- Message Authentication Code
- Message Number
- Monte Carlo algorithm
- MsDS-SupportedEncryptionTypes
- NICI
- NIST.SP.800-38
- NMAS
- NSA Suite B Cryptography
- Nakamoto consensus
- Nondeterministic algorithms
- OAuth Dynamic Client Registration Metadata
- OPAL Project
- Off-the-Record Messaging
- Overfitting
- PKCS 1
- Padded
- Password Flow From Active Directory to eDirectory
- Password Maximum Age
- Password Storage Scheme
- PasswordExpirationTime
- Plenum Byzantine Fault Tolerant Protocol
- Probabilistic Neural Network
- Proof-of-Stake
- Pseudorandom function
- Public Key Algorithm
- RFC 1321
- RFC 3279
- RFC 4055
- RFC 4491
- RFC 5905
- RFC 6151
- RFC 8418
- RS256
- Randomized algorithm
- Record Protocol
- Request_object_encryption_alg
- Request_object_encryption_alg_values_supported
- Request_object_signing_alg
- Request_object_signing_alg_values_supported
- Requirement
- SDI Key
- Same Origin Policy
- Search engine
- Secure MIME
- Server Storage Key
- Shared Secret
- Side-channel attacks
- SignatureAlgorithm
- SignatureValue
- Smart contracts
- Sovrin
- Statistic
- Subject Public Key Info
- Subscriber Identification Module
- Supervised Learning
- Symmetric Key Cryptography
- TLS 1.2
- TLS 1.3
- Training dataset
- Traveler Verification Service
- Turing Machine
- Unkeyed Primitives
- VINES Internetwork Protocol
- Variance error
- Verifying Certificate Signatures
- Web Blog_blogentry_150617_1
- Web Blog_blogentry_290417_1
- WebAuthn Authenticator Model
- Windows Time service
- [#1] - https://machinelearningmastery.com/how-machine-learning-algorithms-work/
- based on information obtained 2018-01-01-