TBS - Encryption Flashcards
Encryption
The process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key
Cleartext
aka plaintext, text that can be read and understood
Ciphertext
text which has been mathematically scrambled so its meaning cannot be determined
Key
used to translate cipher text to plaintext
Risks that encryption reduces
Risks of privacy such as credit card numbers and personal information
Symmetric encryption
aka single-key encryption or private-key encryption, uses a single algorithm to encrypt and decrypt the text. The sender uses the encryption algorithm to create the cipher text and sends the encrypted text to the recipient; the sender must let the recipient know which algorithm was used to encrypt the text and the recipient uses the same algorithm to decrypt the text
Asymmetric encryption
aka public/private-key encryption and private-key encryption uses two paired encryption algorithms to encrypt and decrypt the text. If the public key is used to encrypt the text, the private key must be used to decrypt the text; converse, if the private key is used to encrypt the text, the public key must be used to decrypt the text.
Certificate Authority (CA)
registers a public key on its server and sends the private key to the user; when someone wants to communicate securely with the user, they access the public key from the CA server, encrypt the message, and send it to the user; the user then uses the private key to decrypt the message
Relative security of symmetric encryption
The symmetric encryption methodology is inherently insecure because the sender must always find a way to let the recipient know which encryption algorithm to use, therefore it is most commonly used with “data-at-rest”, i.e. data that is stored in an archive or data warehouse
Relative security of asymmetric encryption
More complicated, cumbersome, and secure than symmetric encryption. The transmission is more secure because only the private key can decrypt the message and only the user has access to the private key. It can have compatibility problems when using mobile technology