encryption Flashcards

1
Q

mathematical applications applied to a block of data

A

algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

small piece of data that controls an algorithm’s execution and is required to
encrypt and decrypt a message.

A

keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

uses the same key for both encryption and decryption. Because it performs
quickly and requires a smaller key, <> is a more practical means for encrypting
large blocks of data and data to be shared with multiple people.

A

symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

uses one key for encryption and another key for
decryption. The sender uses a public key to encrypt the message, and the recipient uses a private
key to decrypt the message.

A

assymetric encrpytion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

provides built-in encryption that is applied throughout a program (for example,
databases, word processors and email programs). The benefit of <> is that organizations do not need to develop encryption features. The drawback, however, is that it offers little choice in the type of encryption that can be applied to the data. There is also a risk that the encryption technology may become outdated

A

application encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

records are encrypted one record at a time. This
provides enhanced protection because the protection is more granular; however, record encryption
may cause performance issues because encrypting and decrypting data can be time consuming.

A

record encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

provides the ability to encrypt specific fields of data; typically,
fields that are considered sensitive, such as credit card numbers or health-related information.

A

field encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

uses the
principles of quantum mechanics to encrypt messages in a way that prevents anyone other than
the intended recipient from reading them.<> is limited by its lack of practicality,
including transmission distance and key generation rate, as well as the need for technology that is
still in the early stages of development.

A

Quantum encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

makes public-key cryptography workable by
providing tools for obtaining and verifying public keys that belong to individuals, web servers,
organizations and other entities that require digital identification

A

public-key infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

allows encrypted information to be
manipulated without first being decrypted. Early homomorphic encryption was too slow to be of
practical use but is now fast enough to use with some applications that require high degrees of
privacy and security

A

homomorphic encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the algorithm (the encryption/decryption
pair) is mutated with each copy of the code, while the outcome of the encryption remains the same
for any given key. The advantages of this type of encryption are that due to the frequent changes
the algorithm becomes more difficult to recognize over time, and it becomes harder to decrypt
because of the lack of an obvious relationship between the algorithm and the results.

A

polymorphic encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a way to hide one’s traffic within a crowd by combining traffic from multiple computers into a single channel that is sent between multiple computers, and then separating the traffic out aga

A

mix networks, onion routing networks,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a class of algorithms that
allows programs running on different computers to participate in computations such that results
can be computed without compromising each party’s private data. Currently, <> are faster than homomorphic encryption algorithms but harder to set up
because of the need to coordinate the computations.

A

Secure multiparty computation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a range of protocols through
which data can be retrieved from a database without revealing to the database or another observer the information that is retrieved. PIR systems provide for data access but not necessarily for data
modification. Some <> systems allow for the database to perform sophisticated operations, such as searching for documents that match a particular keyword, or for retrieving encrypted documents
in sorted order, all without knowing the underlying data that is being operated upon.

A

Private information retrieval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly