Encryption Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Encryption:

A

The process of converting plaintext into ciphertext using an algorithm and a key to secure information during transmission or storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Plaintext:

A

The original, human-readable data or message before encryption is applied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Algorithm:

A

A set of well-defined steps or rules followed to perform encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ciphertext:

A

The encrypted, unreadable output produced by applying an encryption algorithm to plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key:

.

A

A piece of information used by an encryption algorithm to control the transformation of plaintext into ciphertext and vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Symmetric Encryption:

A

A type of encryption where the same key is used for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Private Key:

A

In asymmetric encryption, the key that is kept secret and used for decrypting messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetric Encryption:

A

A type of encryption that involves a pair of keys (public and private) where data encrypted with one key can only be decrypted by the other key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Public Key:

A

In asymmetric encryption, the key that is shared openly and used for encrypting messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AES (Advanced Encryption Standard):

A

A symmetric encryption algorithm widely adopted for securing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RSA:

A

A widely used asymmetric encryption algorithm named after its inventors: Ron Rivest, Adi Shamir, and Leonard Adleman.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hash Function:

A

A one-way function that transforms data into a fixed-size string of characters, commonly used for integrity verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital Signature:

A

A cryptographic technique that verifies the origin and integrity of a digital message or document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SSL/TLS:

A

Protocols that provide secure communication over a computer network, commonly used for securing web traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Key Exchange:

A

The process by which cryptographic keys are shared between two parties to enable secure communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly