Section 8.69 Symmetric vs Asymmetric Flashcards

Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity

1
Q

Symmetric Encryption
(aka Private Key Encryption)

A

■ Encryption algorithm in which both the sender and the reciever must know the same shared secrect using a Private Key

More people = more sharing of the same Private Key

e.g Key to a house - shared key

■ Challenges with key distribution in large-scale usage: More people means more sharing of the keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric Encryption
(aka Public Key Cryptography)

A

Encryption alogrithm where different keys are used to encrpypt and decrypt the data

Public key for encryption
Private key for decryption

■ Slower compared to symmetric encryption but solves key distribution challenges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hybrid Approach

A

■ Combines both symmetric and asymmetric encryption for optimal benefits

Asymmetric encryption: To encrypt and share a secret key

Symmetric encryption: For bulk data transfer, leveraging the shared secret key

  • Sender generates a one time use Session Key
  • One time Session Key is encrypted using the recievers public key protecting the data
  • Recievers Private key decrypts the one time Session Key
  • Both users now have the same key and switch to faster Symmetric AES

Hybrid offers security and efficiency.
CONVENTIONAL KEY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Ciphers

Stream Cipher

A

Utilises a keystream generator to encypt data bit by bit or or byte-by-byte using a mathematical ‘exclusive or’ (XOR) function to create the ciphertext

■ Suitable for real-time communication data streams like audio and video

■ Often used in symmetric algorithms so use the same key for encyption and decryption

PLAIN TEXT to CIPHER TEXT - use process such as stream cipher or block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Ciphers

Block Cipher

A

Breaks the input into fixed-length blocks of data and peforms the encryption on each block rather than bit by bit

● Usually 64, 128, or 256 bits at a time

■ Padding added to smaller data blocks to fit the fixed block size (less than 64 bits)

■ Advantages include ease of implementation and security HOWEVER Stream cipher is quicker
■ Can be implemented in software, whereas stream ciphers are often used in hardware solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly