Asymmetric Encryption

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/23

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts and terms related to Asymmetric Encryption for the exam.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

24 Terms

1
New cards

Asymmetric Encryption

A type of encryption that uses two different keys for encrypting and decrypting messages.

2
New cards

Symmetric Encryption

A type of encryption where the same key is used for both encrypting and decrypting a message.

3
New cards

Public Key Cryptography

A cryptographic system that uses pairs of keys: a public key for encryption and a private key for decryption.

4
New cards

RSA (Rivest, Shamir, Adleman)

A widely used asymmetric encryption algorithm that is based on the mathematical challenge of factoring large prime numbers.

5
New cards

Public Key

A key that can be shared with everyone and is used to encrypt messages.

6
New cards

Private Key

A key that is kept secret and is used to decrypt messages that were encrypted with the corresponding public key.

7
New cards

Digital Certificate

An electronic document used to prove the ownership of a public key, issued by a Certificate Authority (CA).

8
New cards

Certificate Authority (CA)

An entity that issues digital certificates and verifies the identity of the entities receiving them.

9
New cards

Key Exchange Problem

The issue of securely sharing encryption keys between parties who have never met.

10
New cards

Man-In-The-Middle Attack

A type of attack where a third party intercepts communications between two parties to eavesdrop or alter the message.

11
New cards

Digital Signature

A mathematical scheme for verifying the authenticity and integrity of a message, using algorithms such as RSA or ECC.

12
New cards

Elliptic Curve Cryptography (ECC)

A public key cryptography method that uses the mathematics of elliptic curves to provide security with smaller key sizes.

13
New cards

Diffie-Hellman Key Exchange

An algorithm used to securely exchange cryptographic keys over a public channel.

14
New cards

Chain of Trust

A sequence of certifications linking a user or entity to a trusted authority, used to ensure the legitimacy of digital certificates.

15
New cards

Hash Value

A fixed-size string of characters generated by a hash function, representing the original data for validation.

16
New cards

Computationally Infeasible

A term describing a process that would take an impractically long time to compute, making it secure against brute-force attacks.

17
New cards

Public Key Infrastructure (PKI)

The framework that manages digital certificates and public-key encryption to secure communications over the internet.

18
New cards

Typosquatting

A malicious practice where attackers register a domain name similar to a legitimate site to deceive users.

19
New cards

Plaintext

The original, unencrypted message or data that is input into an encryption algorithm.

20
New cards

Ciphertext

The encrypted message or data that is the output of an encryption algorithm.

21
New cards

Confidentiality

Ensuring that information is accessible only to those authorized to have access.

22
New cards

Integrity

Ensuring that information has not been altered or destroyed in an unauthorized manner.

23
New cards

Authentication

The process of verifying the identity of a user, process, or device before allowing access.

24
New cards

Non-repudiation

The assurance that a party cannot deny the authenticity of their signature on a document or the sending of a message.