5.6: Encryption (Doshi) Flashcards

1
Q

Symmetric encryption

A

A single key is used to encrypt and decrypt messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are the keys said to be “symmetric” in a symmetric encryption?

A

Because the encryption key is the same as the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The advantage of symmetric encryption

A

Faster computation and processing.

Inexpensive as compared to asymmetric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Major disadvantage of symmetric encryption

A

Sharing key with another party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Asymmetric encryption

A

Involves 2 keys ; private key and public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encryption and decryption in asymmetric encryption

A

A message encrypted by private key can be decrypted
only by corresponding public key

A message encrypted by public key can be decrypted
only by corresponding private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The speed of asymmetric encryption and cost

A

Slower computation and processing that a symmetric encryption. Asymmetric is expensive compared to symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The advantage of asymmetric encryption

A

Each party has its own key to encrypt/decrypt a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who has access to the SENDER’S PRIVATE key in asymmetric encryption?

A

Key is available ONLY with SENDER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who has access to the SENDER’S PUBLIC key in asymmetric encryption?

A

Key is available on PUBLIC DOMAIN. The public key can be accessed by ANYONE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who has access to the RECEIVER’S PRIVATE key in asymmetric encryption?

A

Key is available ONLY with RECEIVER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who has access to the RECEIVER’S PUBLIC key in asymmetric encryption?

A

Key is available on PUBLIC DOMAIN. The public key can be accessed by ANYONE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the objectives that keys are used to achieve?

A

Confidentiality/ Autentication/ Non-repudiation / Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Use of key when objective is to maintain Confidentiality

A

In any given scenario, when objective is to ensure ‘confidentiality’, message has to be encrypted using receiver’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Use of key when objective is to ensure Authentication /Non-repudiation

A

In any given scenario, when objective is to ensure authentication and/or non-repudiation following steps to be performed:

(1) hash (message digest) of the message has to be created
(2) and hash to be encrypted using sender’s private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Use of key when objective is to ensure Integrity:

A

In any given scenario, when objective is to ensure ‘Integrity’ following steps to be performed:

(1) hash (message digest) of the message has to be created
(2) and hash to be encrypted using sender’s private key

17
Q

Use of keys when objective is to ensure Confidentiality and Authentication:

A

In any given scenario, when objective is to ensure ‘confidentiality and authentication’, following treatment is required:

(1) message to be encrypted using receiver’s public key (to ensure confidentiality).
(2) hash of the message to be encrypted using sender’s private key (to ensure authentication/non-repudiation).

18
Q

Use of keys when objective is to ensure Confidentiality ; Authentication and Integrity:

A

In any given scenario, when objective is to ensure ‘confidentiality and authentication and integrity’, following treatment is required:

(1) message to be encrypted using receiver’s public key (to ensure confidentiality)
(2) hash of the message to be encrypted using sender’s private key (to ensure authentication/non-repudiation and integrity)