Encryption Flashcards

1
Q

Encoding vs Encryption

A

Encoding is reversible with a publicly available algorithm, encryption can be recovered with a key that is not publicly available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a cipher

A

A method or algorithm used to encrypt or encode plaintext data into cipher text. Transforms plaintext data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Examples of encoding (5)

A

Base64
URL encoding
Hexadecimal encoding
ROT13 encoding - rotates letters in alphabet by 13 letters
ASCII- used to encode data in a format such as digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asymmetric Encryption is:

A

Asymmetric encryption, also known as public-key cryptography, uses a pair of keys: a public key and a private key. The public key is used for encryption, while the private key is used for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Symmetric encryption is:

A

Symmetric encryption, also known as secret-key or private-key encryption, uses the same key for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Symmetric encryption algorithms (4)

A

AES (Advanced Encryption Standard): Widely used for securing sensitive data, AES is a symmetric block cipher with key lengths of 128, 192, or 256 bits.

DES (Data Encryption Standard): An older symmetric encryption algorithm, DES operates on 64-bit blocks and uses a 56-bit key.

3DES (Triple DES): A variant of DES that applies the DES cipher algorithm three times to each data block, providing stronger security.

RC4: A stream cipher widely used in protocols such as SSL/TLS, WEP, and WPA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetric encryption algorithms (3)

A

RSA (Rivest-Shamir-Adleman): Named after its inventors, RSA is widely used for secure data transmission, digital signatures, and key exchange.

DSA (Digital Signature Algorithm): A standard for digital signatures based on mathematical principles similar to RSA.

ECC (Elliptic Curve Cryptography): A family of asymmetric encryption algorithms based on the algebraic structure of elliptic curves over finite fields. ECC offers strong security with shorter key lengths compared to RSA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly