Encryption Concepts Flashcards

1
Q

describe what a hash is used for and how in 2 points, and give an example method

A

1) it is used to ensure data integrity
2) it uses a compression algorithm to reduce the data to a fixed length
3) MD5 and SHA are example algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Fill in the below features of Asymetric encryption:

1) it uses a ___ ___ and a ___ ___
2) it requires a ___ to issue certificates
3) either key can ___ or ____ the data

A

1) it uses a public key and a private key
2) it requires a PKI to issue certificates
3) either key can encrypt or decrypt the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encryption normally includes an algorithm and a …

A

key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s the difference between a stream cipher and a block cipher?

A

stream ciphers encrypt one bit at a time, block ciphers encrypt blocks of data at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What name is given to the principle of validating an identity?

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If you encrypt the hash of an email message with the senders private key, what have you created?

A

a digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

only the sender’s xxxx xxxx can decrypt the hash of an email

A

public key
Remember, they encrypt it with the private key. Anyone should be able to decrypt it to check the hash is correct. The recipient gets the public key from the sender’s public certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly