Encryption Concepts Flashcards
describe what a hash is used for and how in 2 points, and give an example method
1) it is used to ensure data integrity
2) it uses a compression algorithm to reduce the data to a fixed length
3) MD5 and SHA are example algorithms
Fill in the below features of Asymetric encryption:
1) it uses a ___ ___ and a ___ ___
2) it requires a ___ to issue certificates
3) either key can ___ or ____ the data
1) it uses a public key and a private key
2) it requires a PKI to issue certificates
3) either key can encrypt or decrypt the data
Encryption normally includes an algorithm and a …
key
What’s the difference between a stream cipher and a block cipher?
stream ciphers encrypt one bit at a time, block ciphers encrypt blocks of data at a time
What name is given to the principle of validating an identity?
authentication
If you encrypt the hash of an email message with the senders private key, what have you created?
a digital signature
only the sender’s xxxx xxxx can decrypt the hash of an email
public key
Remember, they encrypt it with the private key. Anyone should be able to decrypt it to check the hash is correct. The recipient gets the public key from the sender’s public certificate.