Symmetric vs. Asymmetric Encryption Flashcards

1
Q

What is Symmetric Encryption?

A

Uses one key to encrypt and decrypt. Also called “secret key” encryption, as the key must be kept secret from third parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some pros and cons of Symmetric Encryption?

A

Pros:
Faster because there is only one key

Cons:
Key exchange leaves the key vulnerable
Pre-shared key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List some Symmetric Encryption methods and some characteristics of them.

A

 Advanced Encryption Standard (AES)
* Strongest
* Block Cipher
* 128-bit, 192-bit, 256-bit variants
 Data Encryption Standard (DES) and 3 DES
* Weak
* Block cipher
* 56 bits(DES)
* 112 (2 key)
* 168 bits(3DES)
o 3 keys
 Blowfish
* Block Cipher
* Weak
* 64 bit
 Rivest Cipher (RC*)
* RC4—Stream cipher
* RC5/RC6 – Block ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Asymmetric Encryption?

A

Allows users to encrypt information using shared keys. Data encrypted with the public key can only be decrypted with a private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List some Asymmetric Encryption methods and their characteristics.

A

 RSA (Rivest, Shamir, Adleman)
* One of the Oldest
 Diffie-Hellman
* Old standard
* Many Variants
 Digital Signature Algorithm (DSA)
* Endorsed by NIST for their Digital Signature
Standard
 EIGamal
* Used in GNU Privacy Guard, Pretty Good
Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Digital Signature?

A

A process that uses a public key algorithm (asymmetric encryption) to generate two keys, creating a mathematically linked pair of keys: one private and one public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the process for how a Digital Signature is used to verify identity.

A

A hashing algorithm is used to create a hash value then encrypts it with the private key. It then sends the hash value to someone who has a public key. The public key can then be used to decrypt and verify the identity of the person who has the private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Cipher Suite?

A

Sets of instructions that enable secure network connections through Transport Layer Security (TLS). Behind the scenes, these cipher suites provide a set of algorithms and protocols required to secure communications between clients and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly