Encryption Flashcards
What is Encryption at rest ?
Protect data which is stored in a laptop or any device from theft or any kind of misuse.
Used when one single identity is involved.
Example of EAR
Shared Physical hardware or your personal laptop.
What is Encryption in transit ?
Protect data when it is transferred or received.
It is essentially a shield or wrapper around our data.
Used when multiple parties are involved.
Example of EIT
Data leaving our laptop will be encrypted and sent to the bank and vice versa.
Plain Text
Unprotected data in the form of text, image, audio etc.
Cipher Text
Encrypted data.
Algorithm
Piece of code which uses plain text and a key to generate a cipher text.
Key
Just a password used by the algorithm
Characteristics of Symmetric Encryption
Encryption Key === Decryption Key
Working of Symmetric Encryption
Sender and receiver agree upon an algorithm.
Plain text and symmetric key is used by the algorithm and cipher text is generated and will be sent to the receiver.
Drawbacks of Symmetric Encryption
No secure way of sending the key to the receiver or the key should be shared in advance which is complex.
Characteristics of Asymmetric Encryption
A set of key:
Used when two or more parties are involved (remote location).
Public Key strictly used for ENCRYPTION
Private Key strictly used for DECRYPTION
Using asymmetric Encryption for sending symmetric key.
Take the public key of the receiver.
Generate a symmetric key and encrypt the key with public key and then send it to the receiver.
Receiver decrypts the key with the private key and use the symmetric key to communicate further.
Working of Asymmetric Encryption
Sender and receiver agree upon an algorithm.
Plain text and public key of robot is used by the algorithm and cipher text is generated and will be sent to the receiver.
Then receiver uses the private key with the algorithm to decrypt the cipher text.
Drawbacks of Asymmetric Encryption
Complex computation is involved.