Encryption

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/18

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:44 PM on 2/23/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

19 Terms

1
New cards
Encryption
The process of converting data into an unreadable format.
2
New cards
Plain Text
Data before applying encryption.
3
New cards
Cipher Text
Data after applying encryption.
4
New cards
Key Encryption
Ensures authenticity, integrity, confidentiality, and non-repudiation of a message.
5
New cards
Public Key
A key that is shared publicly and used to encrypt data, which can be decrypted with its matching private key.
6
New cards
Private Key
A key that is never shared and is used to decrypt data encrypted with its matching public key.
7
New cards
Symmetric Encryption
Encryption using a single shared key for both encryption and decryption.
8
New cards
Disadvantages of Symmetric Encryption
Keys must be exchanged securely, compromised keys can decrypt messages, and it cannot ensure data origin or integrity.
9
New cards
Asymmetric Encryption
Encryption that uses a pair of keys: public key for encryption and private key for decryption.
10
New cards
Symmetric vs Asymmetric: Number of Keys
Symmetric uses 1 key, while Asymmetric uses 2 keys.
11
New cards
Symmetric vs Asymmetric: Key Sharing
Symmetric shares one key, while Asymmetric only shares the public key.
12
New cards

Asymmetric vs Symmetric: Speed of Encryption

Symmetric encryption is generally faster than asymmetric encryption due to simpler algorithms.

13
New cards
Confidentiality
Only the intended recipient should be able to decrypt the message.
14
New cards
Authenticity
Receiver must know who sent the ciphertext.
15
New cards
Integrity
The message must not be modified during transmission.
16
New cards
Non-repudiation
Neither sender nor receiver should be able to deny involvement in the transmission.
17
New cards
Quantum Cryptography
An encryption system using the properties of photons to produce virtually unbreakable encryption.
18
New cards
Advantages of Quantum Cryptography
More secure, can detect eavesdropping, supports longer keys, and is almost un-hackable.
19
New cards
Disadvantages of Quantum Cryptography
Works only for short distances, high maintenance costs, lacks features like digital signatures, and has a high error rate.

Explore top notes

note
Full Approaches Notes
Updated 315d ago
0.0(0)
note
Chapter 3: Proteins
Updated 996d ago
0.0(0)
note
The Unfinished Melody
Updated 160d ago
0.0(0)
note
Rhetorical Techniques
Updated 145d ago
0.0(0)
note
Ch 14 - Money and Banking
Updated 1086d ago
0.0(0)
note
Full Approaches Notes
Updated 315d ago
0.0(0)
note
Chapter 3: Proteins
Updated 996d ago
0.0(0)
note
The Unfinished Melody
Updated 160d ago
0.0(0)
note
Rhetorical Techniques
Updated 145d ago
0.0(0)
note
Ch 14 - Money and Banking
Updated 1086d ago
0.0(0)

Explore top flashcards

flashcards
Spanish 1: 8a vocab
30
Updated 719d ago
0.0(0)
flashcards
Level C Unit 1 Definitions
20
Updated 228d ago
0.0(0)
flashcards
APUSH MIDTERM
38
Updated 841d ago
0.0(0)
flashcards
Uro- Penile Disorders
43
Updated 363d ago
0.0(0)
flashcards
Health - Ch 3 Test
36
Updated 775d ago
0.0(0)
flashcards
Management Test 1
75
Updated 783d ago
0.0(0)
flashcards
1A Appearance Vocab
44
Updated 1065d ago
0.0(0)
flashcards
Spanish 1: 8a vocab
30
Updated 719d ago
0.0(0)
flashcards
Level C Unit 1 Definitions
20
Updated 228d ago
0.0(0)
flashcards
APUSH MIDTERM
38
Updated 841d ago
0.0(0)
flashcards
Uro- Penile Disorders
43
Updated 363d ago
0.0(0)
flashcards
Health - Ch 3 Test
36
Updated 775d ago
0.0(0)
flashcards
Management Test 1
75
Updated 783d ago
0.0(0)
flashcards
1A Appearance Vocab
44
Updated 1065d ago
0.0(0)