2.3 Encryption Flashcards

1
Q

encrypt

A

convert plain text into cypher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

decrypt

A

convert back cypher text into plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

plain text

A

data before it is encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

cipher text

A

data after it is encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

encryption

A

encoding data into a form that is meaningless using an algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Does encryption prevent hackers from hacking or stop the data from being stolen?

A

Encryption doesn’t stop the data from being stolen. It just makes it very difficult for hackers to understand the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of encryption

2

A

Asymmetric Encryption
Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric Encryption

A
  • Data is encrypted and decrypted using the same key/algorithm.
  • Encryption key is applied to plain text to convert it into cypher text.
  • Key is sent to receiver to allow data to be decrypted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Asymmetric Encryption

A
  • Uses a public key and a private key. The public key is available to everyone, whereas the private key is only available to the user.
  • Both keys are needed to encrypt and decrypt information
  • The receiver would have the private key, and they would send the public key to the sender. The sender can encrypt the message with the public key, and the data can be decrypted using the private key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

why asymmetric encryption is safer than symmetric encryption when sending data over the internet?

A

Asymmetric encryption is safer than symmetric encryption for internet data transfer because it uses two keys: a public key for encryption and a private key for decryption. This prevents the need to share the private key, reducing the risk of interception compared to symmetric encryption, which uses a single key for both processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly