Midterm 01 - Technology (Keys, Encryption, Identity)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/6

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

7 Terms

1
New cards

Symmetric Encryption

  1. one key used to encrypt (apply a mathematical formula to scramble the contents)

  2. and also used to decrypt (apply a mathematical formula to unscramble the contents

2
New cards

What is the main risk of symmetric encryption?

The key must be shared between the sender and the receiver. If it falls into the wrong hands, the data can be decrypted by unauthorized users.

3
New cards

Definition of asymmetric encryption

Asymmetric encryption uses two keys: a public key (to encrypt) and a private key (to decrypt). The private key is never shared, and anyone with the public key can encrypt messages for the private key holder to decrypt

4
New cards

Asymmetric encryption (public key to private key)

Hide messages: Two keys are used to encrypt and decrypt. The private key is never shared, but you share the public key so anyone can encrypt it. Public key holders send to private key holders.

5
New cards

Asymmetric encryption (private key to public key)

Provide identity: A sender can encrypt with their private key. Only the corresponding public key can decrypt the message, proving that the message came from the holder of the private key, thus confirming identity.

6
New cards

What are the main uses of asymmetric encryption?

  1. create public keys/accounts

  2. create digital signatures

7
New cards

Unlocking process