71. Asymmetric Algorithms

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

Asymmetric Algorithm

Does not require a shared secret key, often referred to as public key cryptography since their key is considered to be freely and openly available to the public

2
New cards

Digital Signature

A hash digest of a message encrypted with the sender’s private key to let the recipient know the document was created and sent by the person claiming to have sent it

3
New cards

How does asymmetric encryption ensure confidentiality?

Only the receiver can decrypt the message because we encrypted the hash with their public key

4
New cards

How does asymmetric encryption ensure integrity?

The hash of the message

5
New cards

How does asymmetric encryption ensure non-repudiation

Only the sender could encrypt the hash

6
New cards

Common Asymmetric Algorithms

Diffie-Hellman

(RSA) Rivest-Shamir-Adleman

(ECC) Elliptic Curve Cryptographic

7
New cards
Diffie-Hellman
Used to conduct key exchanges and secure key distribution over an unsecure network
8
New cards
RSA
Rivest-Shamir-Adleman
9
New cards
Rivest-Shamir-Adleman
Asymmetric algorithm that relies on the mathematical difficulty of factoring large prime numbers. Can support key sizes between 1024 bits and 4096 bits
10
New cards
ECC
Elliptic Curve Cryptographic
11
New cards
Elliptic Curve Cryptographic
Heavily used in mobile devices and it's based on the algebraic structure of elliptical curves over finite fields to define its fields. Is with a 256 bit key as secure as RSC with a 2048 bit key
12
New cards
ECDH
Elliptic Curve Diffie-Hellman
13
New cards
Elliptic Curve Diffie-Hellman
ECC version of the popular Diffie-Hellman key exchange protocol
14
New cards
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
15
New cards
Elliptic Curve Diffie-Hellman Ephemeral
Uses a different key for each portion of the key establishment process inside the Diffie-Hellman key exchange
16
New cards
ECDSA
Elliptic Curve Digital Signature Algorithm
17
New cards
Elliptic Curve Digital Signature Algorithm
Used as a public key encryption algorithm by the US government in their digital signatures
18
New cards
ECC is most commonly used for
Mobile devices and low-power computer devices