L25. Compare the properties of symmetric vs asymmetric cryptography Flashcards

1
Q

What is cryptography used for?

A

Securing communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two types of cryptographical algorithms?

A

Symmetric and asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does symmetric cryptography work?

A

Symmetric cryptography, also known as secret-key or private-key cryptography, uses a single key for both encryption and decryption. The same key must be shared between the sender and the receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the advantages of symmetric cryptography?

A
  1. Generally faster than asymmetric algorithms; suitable for real-time applications
  2. Require less computational power, making them suitable for encrypting large amounts of data quickly
  3. The use of a single key simplifies the encryption and decryption processes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the main challenge of symmetric cryptography?

A

The secure distribution and management of keys. If the key is intercepted or disclosed, the security of the communication is compromised. Securely sharing the key between parties is problematic, especially over untrusted networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is another disadvantage of symmetric cryptography, besides secure distribution of keys?

A

Scalability – in a network with many users, the number of keys required grows exponentially, complicating key management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are examples of symmetric encryption algorithms?

A

AES, DES, and Blowfish/Twofish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name two use cases for symmetric encryption

A
  1. Bulk Data Encryption: Due to their speed, symmetric algorithms are often used for encrypting large volumes of data, such as in file encryption or disk encryption.
  2. Network Security: Protocols like SSL/TLS and VPNs often use symmetric encryption for the actual data transfer after establishing a secure connection with asymmetric encryption.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does assymetric cryptography work?

A

Asymmetric cryptography, also known as public-key cryptography, uses a pair of keys: a public key for encryption and a private key for decryption. The public key is shared openly, while the private key remains confidential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is assymetric cryptography more secure?

A

The security of asymmetric algorithms is based on mathematical problems that are computationally infeasible to solve, such as factoring large prime numbers or computing discrete logarithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a disadvantage of assymetric cryptography?

A

Asymmetric cryptographic operations are more computationally intensive than symmetric ones, making them slower, particularly for large data sets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name two examples of assymetric cryptography algorithms

A

RSA and ECC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name three use cases for assymetric cryptography

A
  1. Secure exchange of symmetric keys over an insecure channel. Once the symmetric key is shared, it is used for faster bulk data encryption.
  2. Creation of digital signatures, which verify the authenticity and integrity of a message or document.
  3. Protocols such as SSL/TLS use asymmetric cryptography to establish a secure connection before switching to symmetric encryption for data transfer.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are two advantages of assymetric cryptography?

A
  1. It simplifies the process of establishing secure communications, because the public key can be freely distributed without compromising security
  2. Asymmetric cryptography scales better in environments with many users, as each user needs only a single key pair.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name two disadvantages of assymetric cryptography

A
  1. Performance: Slower encryption and decryption processes make asymmetric cryptography less suitable for real-time or large-scale data encryption.
  2. Complexity: Asymmetric cryptography involves more complex algorithms and key management practices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Compare symmetric and assymetric cryptography

A

Symmetric cryptography: Fast and efficient for encrypting large amounts of data, but faces challenges in key distribution and scalability

Asymmetric cryptography: Slower and more computationally demanding, but offers enhanced security and simpler key management for secure communications and digital signatures

17
Q

What is a common example of how symmetric and assymetric cryptography are used together?

A

Assymetric cryptography is often used to encrypt symmetric cryptography keys in order to securely exchange them