15.5.2 Encryption Facts

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:51 PM on 4/25/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

29 Terms

1
New cards

What is encryption?

A security technique that encodes data so only authorized users with a key can decode it

2
New cards

What is the purpose of encryption?

To protect data confidentiality from unauthorized access

3
New cards

What are the two main types of encryption?

Symmetric encryption and asymmetric encryption

4
New cards

What is symmetric encryption?

Encryption that uses a single shared key for both encryption and decryption

5
New cards

What is another name for symmetric encryption?

Secret key or private key encryption

6
New cards

Why is symmetric encryption fast?

It uses less CPU power than asymmetric encryption

7
New cards

What is a drawback of symmetric encryption?

Each communication pair requires a unique shared key

8
New cards

How is a symmetric key shared securely?

Through a secure channel or asymmetric encryption

9
New cards

What happens if a symmetric key is compromised?

All data using that key is no longer secure

10
New cards

What is asymmetric encryption?

Encryption that uses a public key and a private key pair

11
New cards

What is a key pair in asymmetric encryption?

A set of mathematically related public and private keys

12
New cards

What is the public key used for?

Encrypting data or verifying signatures

13
New cards

What is the private key used for?

Decrypting data or creating digital signatures

14
New cards

Can the public key decrypt data?

No, only the private key can decrypt data

15
New cards

Why is asymmetric encryption slower?

It is more CPU-intensive than symmetric encryption

16
New cards

What is DES?

An old symmetric encryption standard that is now considered weak

17
New cards

What is 3DES?

A stronger version of DES that applies encryption three times using a 168-bit key

18
New cards

What is AES?

Advanced Encryption Standard, a strong symmetric encryption method up to 256-bit keys

19
New cards

What is Blowfish?

A symmetric encryption algorithm designed as a DES replacement

20
New cards

What is RSA?

An asymmetric encryption standard based on large prime factorization

21
New cards

What key size does RSA support?

Typically 1,024 to 4,096 bits

22
New cards

What is DSA used for?

Digital signatures in asymmetric cryptography

23
New cards

What is Diffie-Hellman used for?

Key exchange over insecure networks

24
New cards

Does Diffie-Hellman provide encryption?

No, it only provides secure key agreement

25
New cards

What is a weakness of Diffie-Hellman?

It is vulnerable to man-in-the-middle attacks without authentication

26
New cards

What is the main strength of AES compared to DES?

AES uses stronger encryption and larger key sizes

27
New cards

What determines encryption strength in symmetric systems?

Key size in bits

28
New cards

What is the main security strength in asymmetric encryption?

The secrecy of the private key

29
New cards

What happens if a private key is compromised?

A new key pair must be generated immediately