6: Encryption Flashcards

1
Q

symmetric encryption

A

A single key is used to encrypt and decrypt messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why key is said to be symmetric in a symmetric encryption

A

Because the encryption key is the same as the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The advantage of symmetric encryption

A

Faster computation and processing.

Inexpensive as compared to asymmetric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Major disadvantage of symmetric encryption

A

Sharing key with another party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Asymmetric encryption

A

Involves 2 keys ; private key and public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encryption and decryption in asymmetric encryption

A

A message encrypted by private key can be decrypted
only by corresponding public key

A message encrypted by public key can be decrypted
only by corresponding private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the speed of asymmetric encryption and cost

A

Slower computation and processing that a symmetric encryption. Asymmetric is expensive compared to symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The advantage of asymmetric encryption

A

Each party has its own key to encrypt/decrypt a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who has access to the SENDER’S PRIVATE key in asymmetric encryption?

A

Key is available ONLY with SENDER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who has access to the SENDER’S PUBLIC key in asymmetric encryption?

A

Key is available on PUBLIC DOMAIN. The public key can be accessed by ANYONE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who has access to the RECEIVER’S PRIVATE key in asymmetric encryption?

A

Key is available ONLY with RECEIVER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who has access to the RECEIVER’S PUBLIC key in asymmetric encryption?

A

Key is available on PUBLIC DOMAIN. The public key can be accessed by ANYONE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the objectives that keys are used to achieve

A

Confidentiality/ Autentication/ Non-repudiation / Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Use of key when objective is to maintain Confidentiality

A

In any given scenario, when objective is to ensure ‘confidentiality’, message has to be encrypted using receiver’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Use of key when objective is to ensure Authentication /Non-repudiation

A

In any given scenario, when objective is to ensure authentication and/or non-repudiation following
steps to be performed:
1-hash (message digest) of the message has to be created
2-and hash to be encrypted using sender’s private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Use of key when objective is to ensure Integrity:

A

In any given scenario, when objective is to ensure ‘Integrity’ following steps to be performed:
· hash (message digest) of the message has to be created
· and hash to be encrypted using sender’s private key

17
Q

Use of keys when objective is to ensure Confidentiality & ; Authentication:

A

In any given scenario, when objective is to ensure ‘confidentiality & ; authentication’, following
treatment is required:
· message to be encrypted using receiver’s public key (to ensure confidentiality).
· hash of the message to be encrypted using sender’s private key (to ensure authentication/non-repudiation).

18
Q

Use of keys when objective is to ensure Confidentiality ; Authentication & ; Integrity:

A

In any given scenario, when objective is to ensure ‘confidentiality & ; authentication &; integrity’,
following treatment is required:
· message to be encrypted using receiver’s public key (to ensure confidentiality)
· hash of the message to be encrypted using sender’s private key (to ensure
authentication/non-repudiation and integrity)