ECRYPTION TECHNIQUES - IAS

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:49 PM on 3/11/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

21 Terms

1
New cards

Encryption

Is the process of converting readable data (plaintext) into unreadable form (ciphertext) to protect confidentiality.

2
New cards

plaintext

readable data

3
New cards

unreadable

ciphertext

4
New cards

Decryption

Only someone with the correct key can convert the ciphertext back to plaintext

5
New cards

1. Symmetric Encryption

2. Asymmetric Encryption

Major types of Encryption

6
New cards

Symmetric Encryption

Same key used to encrypt & decrypt

7
New cards

Assymetric Encryption

Uses public & private key pair

8
New cards

Caesar Cipher (Classical Encryption)

Shifts every letter by a fixed number.

Example: Shift = 2

A → C

B → D

Y →A

9
New cards

AES (Advanced Encryption Standard)

Industry standard, very secure.

10
New cards

128

192

256

Key sizes of AES

11
New cards

1. WIFI

2. VPN

2. SSL / TSL

Advanced Encryption Standard (AES) is widely used in:

12
New cards

1. Public Key

2. Private Key

Assymetric Encryption uses two keys:

13
New cards

1. Digital Signatures

2. Secure websties

3. Email Encryption

Assymetric Encryption is widely used in:

14
New cards

RSA Encryption (Rivest-Shamir-Adleman)

Mathematical algorithm using large prime numbers.

Very secure but slower than AES. (Advance Encryption Standard)

15
New cards

Hashing

Irreversible (cannot be decrypted)

One way encryption

16
New cards

1. Password Storage

2. Integrity Checking

3. Digital Signatures

Hashing is used in:

17
New cards

1. MD5 (not secure) (Message Digest Algorithm 5)

2. SHA-1 (not secure)

3. SHA 256 (recommended)

What are the Popular Hash Functions:

18
New cards

MD5 (not secure) - Message Digest Algorithm 5

Is a cryptographic hash function that produces a 128-bit hash value, usually shown as a 32-character hexadecimal string.

19
New cards

SHA-1 (not secure)

It is a cryptographic hash function that produces a 160-bit (40 character) hexadecimal hash from any input data.

20
New cards

SHA-256(bit)

Is a cryptographic hash function from the SHA-2 family. It produces a 256-bit hash value, usually shown as a 64-character hexadecimal string.

21
New cards

Secure Hash Algorithm

Meaning of SHA

Explore top notes

note
Rhetorical Devices
Updated 898d ago
0.0(0)
note
Cancer Biology & Epidemiology
Updated 575d ago
0.0(0)
note
en el restaurante vocabulario
Updated 1070d ago
0.0(0)
note
Chapter 13 - Investment
Updated 1136d ago
0.0(0)
note
Mental Health Test Revision
Updated 291d ago
0.0(0)
note
Rhetorical Devices
Updated 898d ago
0.0(0)
note
Cancer Biology & Epidemiology
Updated 575d ago
0.0(0)
note
en el restaurante vocabulario
Updated 1070d ago
0.0(0)
note
Chapter 13 - Investment
Updated 1136d ago
0.0(0)
note
Mental Health Test Revision
Updated 291d ago
0.0(0)

Explore top flashcards

flashcards
ACA 101 Final
78
Updated 1201d ago
0.0(0)
flashcards
Sadlier Vocab Level G Unit 1-3
41
Updated 120d ago
0.0(0)
flashcards
ASD4 Cap 3
35
Updated 1150d ago
0.0(0)
flashcards
Listening and speaking 4
26
Updated 278d ago
0.0(0)
flashcards
Spanish 2 3.2 Vocabulary
27
Updated 1162d ago
0.0(0)
flashcards
dossier 3 en route 2 (examen)
28
Updated 1022d ago
0.0(0)
flashcards
Biology Exam 8-12
141
Updated 1078d ago
0.0(0)
flashcards
ACA 101 Final
78
Updated 1201d ago
0.0(0)
flashcards
Sadlier Vocab Level G Unit 1-3
41
Updated 120d ago
0.0(0)
flashcards
ASD4 Cap 3
35
Updated 1150d ago
0.0(0)
flashcards
Listening and speaking 4
26
Updated 278d ago
0.0(0)
flashcards
Spanish 2 3.2 Vocabulary
27
Updated 1162d ago
0.0(0)
flashcards
dossier 3 en route 2 (examen)
28
Updated 1022d ago
0.0(0)
flashcards
Biology Exam 8-12
141
Updated 1078d ago
0.0(0)