IAS Flashcards
is the practice and study of techniques for
securing communication and data in the presence of third parties
(adversaries).
Cryptography
Uses the same key for both encryption and decryption.
Fast and efficient, suitable for encrypting large amounts of data.
sharing the secret key securely with the recipient can be challenging
* Used in data storage and bulk data transfer.
Symmetric Encryption
- Involves two keys a public key (used for encryption) and a
private key (used for decryption).
Example: RSA (Rivest-Shamir-Adleman), ECC (Elliptic-Curve
Cryptography), and DSA (Digital Signature Algorithm). - Enhances security as the private key does not need to be
shared. - Slower and computationally more intensive compared to
symmetric encryption. - Common in secure communications like SSL/TLS and digital
certificates.
Asymmetric Encryption
is the process of converting plaintext into ciphertext
using an algorithm and a key.
Encryption
is reverting the ciphertext back into plaintext using
the appropriate key.
Decryption
electronic signatures that verify the
authenticity of a digital message or document. Provide integrity
and non-repudiation.
Digital Signatures
A symmetric key encryption standard widely used for secure data
encryption.
Known for its strength, speed, and efficiency. Used in both software
and hardware implementations.
AES (Advanced Encryption Standard)
One of the most widely used asymmetric encryption algorithms.
Utilized in secure data transmission, digital signatures, and SSL/TLS
encryption for internet security.
RSA (Rivest-Shamir-Adleman)
- Uses elliptic curves to create smaller, more efficient cryptographic
keys. - The same level of security as RSA but with shorter key lengths,
making it ideal for mobile devices and IoT applications.
ECC (Elliptic-Curve Cryptography)
encrypts sensitive data to prevent
unauthorized access, even if data is intercepted or stolen.
Data Protection
cryptography defends against
common threats like man-in-the-middle attacks, data breaches,
and phishing scams.
Preventing Cyber Attacks
proper management and storage of
cryptographic keys for data security.
* Importance of using strong keys and regularly updating them to
prevent vulnerabilities.
Key Management
some older cryptographic algorithms (like
MD5 and SHA-1) are considered weak due to vulnerabilities
and should be avoided.
Weak Algorithms