Encryption

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 18

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

19 Terms

1
Encryption
The process of converting data into an unreadable format.
New cards
2
Plain Text
Data before applying encryption.
New cards
3
Cipher Text
Data after applying encryption.
New cards
4
Key Encryption
Ensures authenticity, integrity, confidentiality, and non-repudiation of a message.
New cards
5
Public Key
A key that is shared publicly and used to encrypt data, which can be decrypted with its matching private key.
New cards
6
Private Key
A key that is never shared and is used to decrypt data encrypted with its matching public key.
New cards
7
Symmetric Encryption
Encryption using a single shared key for both encryption and decryption.
New cards
8
Disadvantages of Symmetric Encryption
Keys must be exchanged securely, compromised keys can decrypt messages, and it cannot ensure data origin or integrity.
New cards
9
Asymmetric Encryption
Encryption that uses a pair of keys: public key for encryption and private key for decryption.
New cards
10
Symmetric vs Asymmetric: Number of Keys
Symmetric uses 1 key, while Asymmetric uses 2 keys.
New cards
11
Symmetric vs Asymmetric: Key Sharing
Symmetric shares one key, while Asymmetric only shares the public key.
New cards
12

Asymmetric vs Symmetric: Speed of Encryption

Symmetric encryption is generally faster than asymmetric encryption due to simpler algorithms.

New cards
13
Confidentiality
Only the intended recipient should be able to decrypt the message.
New cards
14
Authenticity
Receiver must know who sent the ciphertext.
New cards
15
Integrity
The message must not be modified during transmission.
New cards
16
Non-repudiation
Neither sender nor receiver should be able to deny involvement in the transmission.
New cards
17
Quantum Cryptography
An encryption system using the properties of photons to produce virtually unbreakable encryption.
New cards
18
Advantages of Quantum Cryptography
More secure, can detect eavesdropping, supports longer keys, and is almost un-hackable.
New cards
19
Disadvantages of Quantum Cryptography
Works only for short distances, high maintenance costs, lacks features like digital signatures, and has a high error rate.
New cards

Explore top notes

note Note
studied byStudied by 25 people
951 days ago
5.0(1)
note Note
studied byStudied by 27 people
884 days ago
5.0(1)
note Note
studied byStudied by 141 people
830 days ago
5.0(1)
note Note
studied byStudied by 2783 people
1359 days ago
5.0(3)
note Note
studied byStudied by 20 people
955 days ago
5.0(1)
note Note
studied byStudied by 1 person
43 days ago
4.0(1)
note Note
studied byStudied by 12 people
966 days ago
5.0(1)
note Note
studied byStudied by 66 people
784 days ago
5.0(2)

Explore top flashcards

flashcards Flashcard (45)
studied byStudied by 96 people
542 days ago
5.0(1)
flashcards Flashcard (104)
studied byStudied by 26 people
756 days ago
5.0(2)
flashcards Flashcard (39)
studied byStudied by 866 people
846 days ago
4.9(44)
flashcards Flashcard (39)
studied byStudied by 33 people
789 days ago
5.0(4)
flashcards Flashcard (35)
studied byStudied by 4 people
665 days ago
5.0(3)
flashcards Flashcard (26)
studied byStudied by 3 people
837 days ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 21 people
546 days ago
5.0(1)
flashcards Flashcard (342)
studied byStudied by 28427 people
414 days ago
4.5(133)
robot