ENCRYPTION

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 18

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

19 Terms

1

key concepts of encryption

these are

data privacy

data integrity

authentication

New cards
2

data privacy

concept where Encryption ensures that sensitive information remains confidential and can only be accessed by authorized individuals or systems.

By converting plaintext into ciphertext, encryption protects data from being intercepted or read by unauthorized parties during transmission or storage.

New cards
3

data integrity

key concept where Encryption mechanisms often include tools like cryptographic hashes to ensure data has not been altered, either maliciously or accidentally, during transmission or storage.

Recipients can verify that the data received is exactly as it was sent, ensuring trust in its accuracy.

New cards
4

authentication

concept where Encryption is used to verify the identity of the data sender or the system with which a user is communicating.

Digital signatures and certificates, often implemented using asymmetric encryption, authenticate the source of the data, preventing impersonation or fraud.

New cards
5

type of encryption

these are

symmetric

asymmetric

New cards
6

symmetric encryption

use same key for both encryption and decryption

  • Keys must be kept secret to ensure security.

    • Examples: AES, DES, Triple DES.\

      Advantages:
      Fast and efficient for large datasets
      Simpler implementation.

    • Disadvantages:
      Key distribution challenges.
      Single point of failure if the key is compromised.

New cards
7

symmetric-key cryptography

In -_____, the same key is used by the sender(for encryption) and the receiver (for decryption).

The key is shared. Algorithm: DES,3DES


It mainly used for encryption and decryption, cannot be used for digital signatures

often used for long messages

New cards
8

Asymmetric Encryption

Uses a pair of keys: Public key for encryption, private key for decryption.

Examples: RSA, ECC, DSA.

  • Advantages:
    Simplifies key distribution (public key can be shared).
    Provides digital signatures for authentication.

  • Disadvantages:
    Slower compared to symmetric encryption. Higher computational overhead.

New cards
9

Asymmetric Key Cryptography


  • (Public Key Cryptography)

    • 2 different keys are used

      • Users get the Key from an Certificate Authority

It can be used for encryption and decryption as well as for digital signatures

it is more efficient for short messages

New cards
10

asymmetric-key

An ______ (or public-key) cipher uses two keys: one private (To encrypt data) and one public(To decrypt data).

key process of “Ke# Kd”

New cards
11
  • Private Key

  • Asymmetric encryption use two keys:

Public Key - to encrypt the data Private Key - to decrypt the data

  • These keys are generated together.

  • The Public key(s) is distributed freely between the sender and receiver.

  • The other is named as ______ and it is kept hidden.

    • The ________ is only used for Decryption and will not be shared between the sender and receiver.

New cards
12

merits

Two parties don't need to have their private keys already shared in order to communicate using encryption.


New cards
13

Authentication

______ and Non-Repudiation are possible. (______ means that you can encrypt the message with my public key and only I can decrypt it with my private key. Non-repudiation means that you can "sign" the message with your private key and I can

verify that it came from you with your public key.)


New cards
14

demerits

  • Asymmetric Encryption algorithms are comparatively complex.

  • Time consuming process for Encryption and Decryption.

New cards
15

Hybrid Encryption Systems

  • Use asymmetric encryption to securely exchange symmetric keys.

    • Example: SSL/TLS protocols

New cards
16

Encryption

it ensures data confidentiality, integrity, and authentication.ensures data confidentiality, integrity, and authentication.

New cards
17

Symmetric Encryption

  • Fast, but needs secure key sharing.

New cards
18

Asymmetric Encryption

  • Secure key sharing but computationally expensive.

New cards
19
New cards

Explore top notes

note Note
studied byStudied by 25 people
951 days ago
5.0(1)
note Note
studied byStudied by 27 people
884 days ago
5.0(1)
note Note
studied byStudied by 141 people
830 days ago
5.0(1)
note Note
studied byStudied by 2783 people
1359 days ago
5.0(3)
note Note
studied byStudied by 20 people
955 days ago
5.0(1)
note Note
studied byStudied by 1 person
43 days ago
4.0(1)
note Note
studied byStudied by 12 people
966 days ago
5.0(1)
note Note
studied byStudied by 66 people
784 days ago
5.0(2)

Explore top flashcards

flashcards Flashcard (45)
studied byStudied by 96 people
542 days ago
5.0(1)
flashcards Flashcard (104)
studied byStudied by 26 people
756 days ago
5.0(2)
flashcards Flashcard (39)
studied byStudied by 866 people
846 days ago
4.9(44)
flashcards Flashcard (39)
studied byStudied by 33 people
789 days ago
5.0(4)
flashcards Flashcard (35)
studied byStudied by 4 people
665 days ago
5.0(3)
flashcards Flashcard (26)
studied byStudied by 3 people
837 days ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 21 people
546 days ago
5.0(1)
flashcards Flashcard (342)
studied byStudied by 28427 people
414 days ago
4.5(133)
robot