27 - Asymmetric Encryption Flashcards

1
Q

What is asymmetric encryption?

A

A cryptosystem using public/private key pairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a generic key pair consist of?

A
  • Public key (everyone knows this key)
  • Private key (only the designated person knows this key)
    • Unique to the user
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What two Pillars of Cybersecurity does Asymmetric Encryption provide?

A
  1. Confidentiality
  2. Authentication

In Asymmetric Encryption, it requires the layering of the use of public and private keys to ensure information is going to the right user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Example of Encrypted Communication

A

Bob has an authentication problem on his hands. Yes, he’s received a message only he could read, and the message claims to have been sent by Alice, but he has no guarantees that it really did come from Alice. Anyone can send a message to Bob using Bob’s public key, since it’s freely available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Example of Authenticated Communications

A

Bob’s authentication problem is solved. However, Eve, or anyone else seeing the encrypted message, could decrypt it using Alice’s public key, which is freely available, so the message’s confidentiality is not guaranteed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Example of Encrypted and Authenticated Communications

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly