Chapter 17 - Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Public Key

A

Type of Cryptography where different keys are use, one for encryption and one for decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Private Key

A
  • A private key is an unpublished key which has never been transmitted anywhere
  • It has a matching public key
  • It decrypts data its matching public key has encrypted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Plain text

A

Original data before encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cipher Text

A

The result of encryption is transmitted to the recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Encryption

A

Encryption alters the data to something unreadable by anybody for whom the data is not intended to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Symmetric key encryption

A

A single key is used for both encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetric key encryption

A

One key is used to encrypt the message, and the matching key is used to decrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Purpose of Asymmetric cryptography

A
  • To provide better security by using two different keys, private and public
  • One key is used to encrypt the message and the other is used to decrypt the message
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is asymmetric key cryptography used

A
  • Uses matching pair of keys
  • A public key is available for everyone, receivers public key is used to encrypt the data before being sent.
  • A private key is only known to the owner of the keys, receiver’s private key is used for decrypting the message received.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Benefits of asymmetric key cryptography

A
  • more secure as one key is private
  • allows method authentication
  • detects tampering
  • allows non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Drawbacks of symmetric key encryption

A
  • Key has to be exchanged securely
  • once compromised key can be used to decrypt both sent and received messages
  • cannot ensure non-reputation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Differences between Symmetric and Asymmetric cryptography

A
  • Symmetric cryptography uses a single key whereas asymmetric cryptography uses a pair of keys
  • Symmetric key is shared whereas only the public key is shared in asymmetric cryptography. So the risk of compromise is higher in symmetric encryption so asymmetric is more secure
  • Symmetric cryptography is a simple process that can be carried out quickly but asymmetric is much more complex, so slower.
  • length of key of symmetric is shorter
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sending a private message

A
  • Public key sent to sender
  • Sender encrypts data with the public key and sends the cipher text
  • Receiver decrypts data with the private key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Reasons for using key cryptography

A
  • To ensure the message is authentic
  • To ensure only the intended receiver can understand the message
  • To ensure the message has not been altered during transmission
  • Non-repudiation, neither the sender nor receiver can deny that transmission has occurred
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Purpose of Quantum Cryptography

A
  • To produce a virtually unbreakable encryption system using the laws of quantum mechanics
  • Eavesdropping can be detected as properties of photons change
  • To protect the security of data over fiber optic cables to enable using longer keys.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Benefits of Quantum Cryptography

A
  • Longer keys can be used
  • Eavesdropping can be detected
  • Virtually unbreakable
  • Provides security based on laws of physics rather than mathematical algorithms so more secure
17
Q

Drawbacks of Quantum Cryptography

A
  • Limited range
  • Polarized light may change during transmission
  • High cost of purchasing required
  • Lacks vital features such as digital signature.
18
Q
A