ch 7 Flashcards
c
What is Asymmetric Encryption?
Asymmetric encryption uses two keys: a public key for encryption and a private key for decryption.
Why is asymmetric encryption considered more secure than symmetric encryption?
“Asymmetric encryption is more secure because it has a longer key length and uses more complex algorithms.”
What is a key difference between symmetric and asymmetric encryption?
symmetric use one key for encryption and decryption and asymmetric use two keys a public key for encryption and a private key for decryption.
What does RSA stand for, and why is it significant?
RSA based on integer factoraization and is the most widely used public key algorthim
What are the main features of the RSA algorithm?
RSA provides confidentiality, supports digital signatures, is based on integer factorization, and is secure against brute-force and factorization-based attacks.
What is the main security foundation of RSA?
RSA’s security is based on the difficulty of factoring large integers.
In asymmetric encryption, which key is used for encryption and which for decryption?
public key for encryption and private for decryption
How does asymmetric encryption compare to symmetric encryption in terms of computational effort?
Asymmetric encryption requires more computational effort, making it slower but more secure for certain applications.