Encryption Flashcards

1
Q

What is Encryption at rest ?

A

Protect data which is stored in a laptop or any device from theft or any kind of misuse.

Used when one single identity is involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Example of EAR

A

Shared Physical hardware or your personal laptop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Encryption in transit ?

A

Protect data when it is transferred or received.
It is essentially a shield or wrapper around our data.

Used when multiple parties are involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Example of EIT

A

Data leaving our laptop will be encrypted and sent to the bank and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Plain Text

A

Unprotected data in the form of text, image, audio etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cipher Text

A

Encrypted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Algorithm

A

Piece of code which uses plain text and a key to generate a cipher text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Key

A

Just a password used by the algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Characteristics of Symmetric Encryption

A

Encryption Key === Decryption Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Working of Symmetric Encryption

A

Sender and receiver agree upon an algorithm.

Plain text and symmetric key is used by the algorithm and cipher text is generated and will be sent to the receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Drawbacks of Symmetric Encryption

A

No secure way of sending the key to the receiver or the key should be shared in advance which is complex.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Characteristics of Asymmetric Encryption

A

A set of key:

Used when two or more parties are involved (remote location).
Public Key strictly used for ENCRYPTION
Private Key strictly used for DECRYPTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Using asymmetric Encryption for sending symmetric key.

A

Take the public key of the receiver.
Generate a symmetric key and encrypt the key with public key and then send it to the receiver.

Receiver decrypts the key with the private key and use the symmetric key to communicate further.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Working of Asymmetric Encryption

A

Sender and receiver agree upon an algorithm.

Plain text and public key of robot is used by the algorithm and cipher text is generated and will be sent to the receiver.

Then receiver uses the private key with the algorithm to decrypt the cipher text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Drawbacks of Asymmetric Encryption

A

Complex computation is involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Uses of asymmetric encryption

A

SSL, TSL and SSH.

17
Q

Signing

A

Process of verifying an identity. PRIVATE KEY IS NOT DISCLOSED.

18
Q

Working of Signing

A

Robot general will sign the ‘OK’ message with private key and send it to the cat ruler and it verifies using the public key.

19
Q

Steganography

A

Process of embedding important information into an image or any other piece of data.

20
Q

Example of Steganography

A

Cat ruler will use the public key of the robot general and generate cipher text, then embed the cipher text in a puppy image using steganography and send it to robot general.

Then robot general will decode the cipher from the puppy image. Then decrypt using private key.

Robot general encrypts the data with public key of cat ruler and then signs the ‘OK’ message with private key.
Then embed the cipher text in the puppy image and send it to the cat ruler.