1/23
These flashcards cover key concepts and terms related to Asymmetric Encryption for the exam.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Asymmetric Encryption
A type of encryption that uses two different keys for encrypting and decrypting messages.
Symmetric Encryption
A type of encryption where the same key is used for both encrypting and decrypting a message.
Public Key Cryptography
A cryptographic system that uses pairs of keys: a public key for encryption and a private key for decryption.
RSA (Rivest, Shamir, Adleman)
A widely used asymmetric encryption algorithm that is based on the mathematical challenge of factoring large prime numbers.
Public Key
A key that can be shared with everyone and is used to encrypt messages.
Private Key
A key that is kept secret and is used to decrypt messages that were encrypted with the corresponding public key.
Digital Certificate
An electronic document used to prove the ownership of a public key, issued by a Certificate Authority (CA).
Certificate Authority (CA)
An entity that issues digital certificates and verifies the identity of the entities receiving them.
Key Exchange Problem
The issue of securely sharing encryption keys between parties who have never met.
Man-In-The-Middle Attack
A type of attack where a third party intercepts communications between two parties to eavesdrop or alter the message.
Digital Signature
A mathematical scheme for verifying the authenticity and integrity of a message, using algorithms such as RSA or ECC.
Elliptic Curve Cryptography (ECC)
A public key cryptography method that uses the mathematics of elliptic curves to provide security with smaller key sizes.
Diffie-Hellman Key Exchange
An algorithm used to securely exchange cryptographic keys over a public channel.
Chain of Trust
A sequence of certifications linking a user or entity to a trusted authority, used to ensure the legitimacy of digital certificates.
Hash Value
A fixed-size string of characters generated by a hash function, representing the original data for validation.
Computationally Infeasible
A term describing a process that would take an impractically long time to compute, making it secure against brute-force attacks.
Public Key Infrastructure (PKI)
The framework that manages digital certificates and public-key encryption to secure communications over the internet.
Typosquatting
A malicious practice where attackers register a domain name similar to a legitimate site to deceive users.
Plaintext
The original, unencrypted message or data that is input into an encryption algorithm.
Ciphertext
The encrypted message or data that is the output of an encryption algorithm.
Confidentiality
Ensuring that information is accessible only to those authorized to have access.
Integrity
Ensuring that information has not been altered or destroyed in an unauthorized manner.
Authentication
The process of verifying the identity of a user, process, or device before allowing access.
Non-repudiation
The assurance that a party cannot deny the authenticity of their signature on a document or the sending of a message.