Encryption Flashcards
What are the attributes in encryption?
- Plain text
- Hasing function
- Key
- Cipher text
What are the information security objectives?
- Confidentiality
- Integrity
- Availability
- Auditability
What are the elements of access control?
- Identification
- Authentication
- Authorization
- Nonrepudiation
What is symmetric key cryptography?
In symmetric key cryptography, key k is used both for encryption (E) of plain text m and for decryption (d) of cipher text c
What are the problems related to symmetric key cryptography?
- Key distribution
- Secrecy
- Usability
- Storage
How is public key cryptography different compared to symmetric cryptography?
A pair of two related keys (PK, SK) are used and it does not matter if someone intercepts PKb because it is public
What are the advantages of public key cryptography?
- Users do not have to know each other
- Key management
- Electronically signed messages
Which methods are based on SP networks?
- AES
- DES
- 3DES
How do block ciphers work?
They use confusion (adding unknown key values) and diffusion
How does the Feistel cipher work?
It contains a ladder structure and input is split up into two blocks both containing a function, left half and right half,
Why do we have 3DES?
Because the key in DES was too short
Which type of encryption are out there?
Biometric
End-to-end
Quantum
Homomorphic
Blockchain
What is homomorphic encryption?
Fast transmission of highly classified material while keeping material highly secured
What is beneficial about blockchain?
- Reduced costs
- No verification needed
- Decreased computing load