1/28
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What is encryption?
A security technique that encodes data so only authorized users with a key can decode it
What is the purpose of encryption?
To protect data confidentiality from unauthorized access
What are the two main types of encryption?
Symmetric encryption and asymmetric encryption
What is symmetric encryption?
Encryption that uses a single shared key for both encryption and decryption
What is another name for symmetric encryption?
Secret key or private key encryption
Why is symmetric encryption fast?
It uses less CPU power than asymmetric encryption
What is a drawback of symmetric encryption?
Each communication pair requires a unique shared key
How is a symmetric key shared securely?
Through a secure channel or asymmetric encryption
What happens if a symmetric key is compromised?
All data using that key is no longer secure
What is asymmetric encryption?
Encryption that uses a public key and a private key pair
What is a key pair in asymmetric encryption?
A set of mathematically related public and private keys
What is the public key used for?
Encrypting data or verifying signatures
What is the private key used for?
Decrypting data or creating digital signatures
Can the public key decrypt data?
No, only the private key can decrypt data
Why is asymmetric encryption slower?
It is more CPU-intensive than symmetric encryption
What is DES?
An old symmetric encryption standard that is now considered weak
What is 3DES?
A stronger version of DES that applies encryption three times using a 168-bit key
What is AES?
Advanced Encryption Standard, a strong symmetric encryption method up to 256-bit keys
What is Blowfish?
A symmetric encryption algorithm designed as a DES replacement
What is RSA?
An asymmetric encryption standard based on large prime factorization
What key size does RSA support?
Typically 1,024 to 4,096 bits
What is DSA used for?
Digital signatures in asymmetric cryptography
What is Diffie-Hellman used for?
Key exchange over insecure networks
Does Diffie-Hellman provide encryption?
No, it only provides secure key agreement
What is a weakness of Diffie-Hellman?
It is vulnerable to man-in-the-middle attacks without authentication
What is the main strength of AES compared to DES?
AES uses stronger encryption and larger key sizes
What determines encryption strength in symmetric systems?
Key size in bits
What is the main security strength in asymmetric encryption?
The secrecy of the private key
What happens if a private key is compromised?
A new key pair must be generated immediately