Asymmetric Encryption Notes

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/53

flashcard set

Earn XP

Description and Tags

These flashcards cover key terminologies and concepts related to asymmetric encryption as discussed in the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

54 Terms

1
New cards

Asymmetric Encryption

A cryptographic technique using a pair of keys: a public key for encryption and a private key for decryption.

2
New cards

Symmetric Encryption

A cryptographic method that uses the same key for both encryption and decryption.

3
New cards

Public Key

A key that can be shared publicly without compromising security; used to encrypt messages.

4
New cards

Private Key

A secret key that is kept confidential; used to decrypt messages encrypted with its corresponding public key.

5
New cards

RSA

An asymmetric algorithm that relies on the difficulty of factoring large prime numbers.

6
New cards

Key Exchange Problem

The challenge of securely sharing encryption keys with others without a prior relationship.

7
New cards

Digital Certificate

An electronic document that proves the ownership of a public key.

8
New cards

Digital Signature

A cryptographic proof that a message was created by a particular sender and not altered.

9
New cards

Certificate Authority (CA)

An entity that issues digital certificates and verifies the identity of their owners.

10
New cards

Chain of Trust

A hierarchy of trust relationships established through digital certificates.

11
New cards

Man-In-The-Middle Attack

An attack where the attacker intercepts and may alter the communication between two parties.

12
New cards

Public Key Infrastructure (PKI)

A framework of policies, hardware, software, and procedures needed to create, manage, and distribute digital certificates.

13
New cards

Cryptosystem

The combination of an algorithm, keys, and rules for securing information.

14
New cards

Elliptic Curve Cryptography (ECC)

An asymmetric encryption technique offering equivalent security to RSA with smaller keys.

15
New cards

Diffie-Hellman

A key exchange algorithm allowing two parties to create a shared secret over an insecure channel.

16
New cards

Computationally Infeasible

A term used to describe a task that would take an impractical amount of time or resources to complete, such as brute-forcing encryption.

17
New cards

Hash Function

A function that converts input data into a fixed-size string of characters, which is typically a hash value.

18
New cards

Nonce

A number used only once in cryptographic communication to prevent replay attacks.

19
New cards

X.509 Certificate

A standard that defines the format of public key certificates.

20
New cards

Certificate Revocation List (CRL)

A list of certificates that have been revoked before their expiration dates.

21
New cards

OpenSSL

A widely-used library for implementing secure communications over networks.

22
New cards

Session Expired

A notification that a user's session with a server has timed out.

23
New cards

Authenticity

The assurance that a message or identity is genuine and not altered.

24
New cards

Eavesdropping

Listening to or recording private conversations without consent.

25
New cards

Key Hijacking

The unauthorized acquisition of a cryptographic key.

26
New cards

Cloud Storage

Storing data on remote servers accessed from the internet.

27
New cards

Algorithm

A set of rules or instructions for solving a particular problem in computing.

28
New cards

Transposition Cipher

A method of encryption where the positions of the letters are shifted according to a regular system.

29
New cards

Substitution Cipher

A method of encryption where each letter in the plaintext is replaced with a letter some fixed number of positions down the alphabet.

30
New cards

Fingerprinting

A technique to uniquely identify digital certificates.

31
New cards

Brute Force Attack

An attack method that tries all possible keys until the correct one is found.

32
New cards

Session Key

A temporary encryption key used for a single session of communication.

33
New cards

Address Resolution Protocol (ARP)

A communication protocol used for discovering the link layer address associated with a given network layer address.

34
New cards

Public Key Rotation

The process of replacing a public key with a new one after a certain period.

35
New cards

Key Expiry

The condition under which a key is no longer valid after a specified time.

36
New cards

Content Filtering

A method of blocking access to specific types of content on the internet.

37
New cards

Illegal Export

The unauthorized transfer of goods or services to another country.

38
New cards

Ciphertext

The encrypted output of an encryption algorithm.

39
New cards

Plaintext

The original, readable form of data before it is encrypted.

40
New cards

Digital Envelope

A method of wrapping the message to keep it confidential.

41
New cards

Key Management Problem

Challenges in securely storing, sharing, and updating cryptographic keys.

42
New cards

Crypto Community

A group of individuals and organizations focused on cryptography and secure communications.

43
New cards

Mathematical Basis

The underlying mathematical principles that support a cryptographic algorithm.

44
New cards

Key Derivation Function

A function that derives one or more secret keys from a secret value.

45
New cards

Active Attack

An attempt by an unauthorized user to alter or destroy information.

46
New cards

Passive Attack

An attempt to gain access to data without altering it.

47
New cards

Vulnerability Assessment

A systematic review of security weaknesses in an information system.

48
New cards

Firewall

A network security system that monitors and controls incoming and outgoing network traffic.

49
New cards

Encryption Algorithm

A mathematical procedure for performing encryption on data.

50
New cards

Public Key Cryptography

A cryptographic system that uses pairs of keys: public keys for encryption and private keys for decryption.

51
New cards

Key Sharing

The method of securely providing encryption keys to authorized parties.

52
New cards

Algorithm Security

The resilience of an algorithm against various forms of attacks.

53
New cards

Digital Authentication

The process of confirming the identity of a user or device.

54
New cards

Certificate Path

The sequence of certificates from a server to a trusted root CA.