10.2 Asymmetric Encryption and Hashing Flashcards
What is the disadvantages with symmetric key encryption?
These disadvantages can be addressed with ____________.
- As more individuals are included in the key exchange, there needs to be a key for each combination of individuals.
- As more individuals are included in the key exchange, a key must be created for each combination of individuals.
These disadvantages can be addressed with asymmetric key encryption
GPG is a command-line tool used to simplify the creation, encryption, and decryption of _________ key cryptography.
asymmetric
GPG is a command-line tool used to simplify the creation, encryption, and decryption of asymmetric key cryptography.
__________ is a cryptographic method used to verify the integrity of data.
Hashing is a cryptographic method used to verify the integrity of data.
Hashing takes plaintext and converts it to a message digest with an algorithm, and _______.
Hashing takes plaintext and converts it to a message digest with an algorithm, and no key
Hashing is a _______ function, meaning it cannot be converted back to plaintext.
Hashing is a one-way function, meaning it cannot be converted back to plaintext.
Hashing algorithms output fixed lengths. Regardless of the input length, the output length is always ________.
Hashing algorithms output fixed lengths. Regardless of the input length, the output length is always the same.
Encryption’s main goal is _______. Hashing’s main goal is ________.
Encryption’s main goal is privacy. Hashing’s main goal is integrity.
Hashing Algorithims
SHA
Stands for Secure Hashing Algorithms, and includes its successors, SHA1 and SHA2.
Hashing Algorithims
SHA2
SHA2 has variations with different security strengths: SHA-256 and SHA-512
Hashing Algorithims
MD
Stands for Message Digest and has several variations: MD2, MD4, and MD5
Hashing Algorithims
LM and NTLM
Hashes used by Windows.
What algorithim would you use if you want to
SHA2/SHA-256
Cryptography can also be used to validate authenticity using ___________.
Cryptography can also be used to validate authenticity using digital signatures
A ________ is a mathematical scheme
used to verify the authenticity of digital data.
digital signature
In the United States and several other countries, digital signatures are. considered legally binding.
Similar to asymmetric encryption, digital signatures also use public key cryptography.
However, digital signatures use public and private keys in reverse.
When the message and the signataure are sent separately, that’s called a _________.
When the message and the signataure are sent separately, that’s called a detached signature.