asymmetric encryption Flashcards
______ encryption uses keys that are mathematically related
asymmetric
what are the two key used in asymmetric encryption
public and private keys
asymmetric encryption is used for
data encryption
a digital signature
key exchange
asymmetric encryption is used with which protocols
SSL/TLS IPSec VPN S/MIME SSH tunnels
______ keys generated every time the key establishment process is executed and only exists for the lifetime of the session
ephemeral
____ keys can be reused by multiple communication sessions
static
this asymmetric system was the first asymmetric algorithm.
Diffie-Hellman
this asymmetric system is based on discrete logarithm problems
ElGamal
this asymmetric system is based on group of number in a elliptical curve
elliptic curve crypto (ECC)
this asymmetric system was the first is based on subset sum problems
merkel-hellman knapsack
this asymmetric system is based on forcing large number into prime values
RSA
a ______ cryptography system combines the strengths of both the symmetric and asymmetric cryptography systems
hybrid
Diffie-Hellman uses a _______ protocol generates symmetric keys simultaneously at sender and recipient sites over non-secure channels
key agreement
Diffie-Hellman does not use
authentication