ch 7 Flashcards

c

1
Q

What is Asymmetric Encryption?

A

Asymmetric encryption uses two keys: a public key for encryption and a private key for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is asymmetric encryption considered more secure than symmetric encryption?

A

“Asymmetric encryption is more secure because it has a longer key length and uses more complex algorithms.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a key difference between symmetric and asymmetric encryption?

A

symmetric use one key for encryption and decryption and asymmetric use two keys a public key for encryption and a private key for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does RSA stand for, and why is it significant?

A

RSA based on integer factoraization and is the most widely used public key algorthim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the main features of the RSA algorithm?

A

RSA provides confidentiality, supports digital signatures, is based on integer factorization, and is secure against brute-force and factorization-based attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the main security foundation of RSA?

A

RSA’s security is based on the difficulty of factoring large integers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In asymmetric encryption, which key is used for encryption and which for decryption?

A

public key for encryption and private for decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does asymmetric encryption compare to symmetric encryption in terms of computational effort?

A

Asymmetric encryption requires more computational effort, making it slower but more secure for certain applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly