2.3 Encryption Flashcards

1
Q

encrypt

A

convert plain text into cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

decrypt

A

convert back cipher text into plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

plain text

A

data before it is encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

cipher text

A

data after it is encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

encryption

A

encoding data into a form that is meaningless using an algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Does encryption prevent hackers from hacking or stop the data from being stolen?

A

Encryption doesn’t stop the data from being stolen. It just makes it very difficult for hackers to understand the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of encryption

2

A

Asymmetric Encryption
Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric Encryption

A
  • Encryption key is applied to plain text to convert it into cipher text.
  • The cipher text and the encryption key are sent separately to the receiving device.
    Key is sent to receiver to allow data to be decrypted
  • Data is encrypted and decrypted using the same key/algorithm.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Asymmetric Encryption

A
  • Uses a public key and a private key. The public key is available to everyone, whereas the private key is only available to the user.
  • Both keys are needed to encrypt and decrypt information
  • The receiver would have the private key, and they would send the public key to the sender. The sender can encrypt the message with the public key, and the data can be decrypted using the private key.

The process for asymmetric encryption is:
• Plain text is encrypted into cipher text using a public key. This is also a type of
encryption algorithm.
• The cipher text is transmitted to the receiving device.
• The cipher text cannot be decrypted using the public key, it is decrypted using a
private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

why asymmetric encryption is safer than symmetric encryption when sending data over the internet?

A

Asymmetric encryption is safer than symmetric encryption for internet data transfer because it uses two keys: a public key for encryption and a private key for decryption. This prevents the need to share the private key, reducing the risk of interception compared to symmetric encryption, which uses a single key for both processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly