3.4: encryption Flashcards

1
Q

what is encryption

A

the process of converting data into a form that cannot be understood by anyone other than an authorised user
does not prevent data from being acessed but prevents data from being understood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is required to decrypt a message

A

the encryption method and the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

how are keys created

A

from number using binary digits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

key length

A

the number of binary digits used
the longer the key length the more possible combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how are keys generated

A

by computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

brute force attack

A

when computers try and deteremine what keys have been used by genererating every possible combination in a key length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how many bit keys do modern encryption methods use

A

128 bit keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

why are 128 bit keys used

A

because it gives a range of combinations too big for a computer to generate every possible combination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

symetric encryption

A

the same key is used to encrypt and decrypt the message
this means that 2 people with the key can share messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

problem with symetric keys

A

messages sent over a network can be intercepted
therefore if the key is known by unauthorised users the encryption is useless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

asymetric encryption

A

uses 2 keys that work as a pair
the first key is used to encrypt the message
the second key is used to decrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the first key in asymetric encryption

A

used to encrypt the message
can be sent to anyone from who the user wants to recieve an encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the second key in asymetric encryption

A

kept secret by the user so that only they know it
called a private key
as long as the private key is kept secret the encryption is very difficult to break

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

uses of asymetric encryption

A

used by organisations who need to send confidential data for example:
banks
online shops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how asymetric encryption works

A

when a user logs onto a banks website a copy of the banks public key is downloaded to the users browser
any communications sent from the bank to the user are encrypted with the private key
the users browser decrypts the private key using the public key
same works vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

advantage of asymetric encryption

A

the source of the message can be trusted
for example a user connected to an online bank can trust the message they recieve

17
Q

encryption algorithms

A

used to keep data secret from interceptors
ciphers are used to encrpyt and decrypt messages

18
Q

caesar cipher

A

an alphabetical substitution cipher that replaces letters with other letters

19
Q

pigpen cipher

A

substitution cipher by substituting letters in the alphabet by symbols

20
Q

vigenere cipher

A

a key made of letters
add value of each letter to the value of its corresponding letter in the key

21
Q

rail fence cipher

A

uses numbers to create N different levels
the word is written in zigzag across different levels

22
Q

caesar cipher example

A

offset of 3 letters
BSB
would be
EVE

23
Q

advantages of vigenere cipher

A

letters in the original message will have different substituted letters in the encrypted message

24
Q

vigenere cipher example

A

message = BSB
key = LOCK
first letter of message = B so value is 1
first letter of key = L so value is 11
11+1=12
so first letter is M as it is the 12 letter in the alphabet

25
Q

rail fence cipher example

A

message = BSB IS
N = 3
B——-S
–S—I—
—-B—–
encrypted message = BSSIB