Encryption (A2.4 Network security)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/8

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

9 Terms

1
New cards

Encryption

Converting readable data (plaintext) into unreadable ciphertext to prevent unauthorized access

  • Only those with the correct decryption key can decrypt (convert back to plaintext)

2
New cards

I. Types of cryptography

types fo cryptography/encryption

3
New cards

Symmetric cryptography

1 shared secret key for both encryption and decryption

  • Usually used for local sharing of data

4
New cards

Advantages (symmetric cryptography)

Fast and efficient, so good for the transmission of bulk data

5
New cards

Disadvantages (symmetric cryptography)

If this key is stole, the attacker can read ALL messages being transmitted

6
New cards

Asymmetric cryptography

2 keys are used:

  • 1 public key - shared openly, used to encrypt

  • 1 private key - key secret, used to decrypt

Usually used for transferring data across a more public network (Internet, Cloud)

7
New cards

Advantages (asymmetric cryptography)

  • Solves the secure key exchange issue (symmetric)

  • Enables digital signatures to verify authenticity

8
New cards

Disadvantages (asymmetric cryptography)

Requires more complex computation so is slower

9
New cards

II. Digital certificate

Binds public key to an identity (person, organization, device)

  • Issued by Certificate Authorities (CAs) after verifying identity

  • Done to prove authenticity and establish trust in secure communications