6: Encryption Flashcards
symmetric encryption
A single key is used to encrypt and decrypt messages.
Why key is said to be symmetric in a symmetric encryption
Because the encryption key is the same as the decryption key.
The advantage of symmetric encryption
Faster computation and processing.
Inexpensive as compared to asymmetric.
Major disadvantage of symmetric encryption
Sharing key with another party.
Asymmetric encryption
Involves 2 keys ; private key and public key
Encryption and decryption in asymmetric encryption
A message encrypted by private key can be decrypted
only by corresponding public key
A message encrypted by public key can be decrypted
only by corresponding private key
the speed of asymmetric encryption and cost
Slower computation and processing that a symmetric encryption. Asymmetric is expensive compared to symmetric
The advantage of asymmetric encryption
Each party has its own key to encrypt/decrypt a message
Who has access to the SENDER’S PRIVATE key in asymmetric encryption?
Key is available ONLY with SENDER
Who has access to the SENDER’S PUBLIC key in asymmetric encryption?
Key is available on PUBLIC DOMAIN. The public key can be accessed by ANYONE.
Who has access to the RECEIVER’S PRIVATE key in asymmetric encryption?
Key is available ONLY with RECEIVER
Who has access to the RECEIVER’S PUBLIC key in asymmetric encryption?
Key is available on PUBLIC DOMAIN. The public key can be accessed by ANYONE.
What are the objectives that keys are used to achieve
Confidentiality/ Autentication/ Non-repudiation / Integrity
Use of key when objective is to maintain Confidentiality
In any given scenario, when objective is to ensure ‘confidentiality’, message has to be encrypted using receiver’s public key
Use of key when objective is to ensure Authentication /Non-repudiation
In any given scenario, when objective is to ensure authentication and/or non-repudiation following
steps to be performed:
1-hash (message digest) of the message has to be created
2-and hash to be encrypted using sender’s private key.