Encryption Flashcards

1
Q

What is encryption?

A

Data that is scrambled so it cannot be understood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When can data be encrypted?

A

When data is stored or when data is transmitted across network or internet (CAN/WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is called accessing encryption legitimately called?

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a ceasar cipher/what is it used for?

A

Ceaser cipher is used to convert messages into encrypted message - Algorithm (a set of rules) to follow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a shift cipher?

A

Replaces letters in the alphabet by shifting along.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is symmetric encryption?

A

Symmetric encryption uses a single key (private) to encrypt and decrypt.
Both the sender + recipient possess the secret encryption key.
Key is shared securely before the sender receives the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an advantage + disadvantage of symmetric encryption?

A

Advantage - Quick method of encryption because it only uses one key.
Disadvantage - This means the key can be intercepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is asymmetric encryption?

A

Also known as public key cryptography.
Used 2 keys including a: public key - known to everyone and is used to encrypt the data, and a private key- known to recipient and is used to decrypt the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an advantage + disadvantage of asymmetric encryption?

A

Advantage- It’s a more secure method (2 keys, decryption key doesn’t have to be translated.
Disadvantage- lt takes longer to decrypt the data and requires more processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a digital certificate?

A

When encrypted data is required by the recipient, a digital certificate is requested by the computer from the sender.
ASYMMETRIC - In order to find the public key, digital certificates are required.
They identify the user or the server.
Contains:
-organizations name/address
-users email address
-organization who issued certificate
-users country
-users public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the private key?

A

It’s the algorithm used to decrypt the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly