TBS - Encryption Flashcards

1
Q

Encryption

A

The process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cleartext

A

aka plaintext, text that can be read and understood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ciphertext

A

text which has been mathematically scrambled so its meaning cannot be determined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key

A

used to translate cipher text to plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risks that encryption reduces

A

Risks of privacy such as credit card numbers and personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Symmetric encryption

A

aka single-key encryption or private-key encryption, uses a single algorithm to encrypt and decrypt the text. The sender uses the encryption algorithm to create the cipher text and sends the encrypted text to the recipient; the sender must let the recipient know which algorithm was used to encrypt the text and the recipient uses the same algorithm to decrypt the text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetric encryption

A

aka public/private-key encryption and private-key encryption uses two paired encryption algorithms to encrypt and decrypt the text. If the public key is used to encrypt the text, the private key must be used to decrypt the text; converse, if the private key is used to encrypt the text, the public key must be used to decrypt the text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Certificate Authority (CA)

A

registers a public key on its server and sends the private key to the user; when someone wants to communicate securely with the user, they access the public key from the CA server, encrypt the message, and send it to the user; the user then uses the private key to decrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Relative security of symmetric encryption

A

The symmetric encryption methodology is inherently insecure because the sender must always find a way to let the recipient know which encryption algorithm to use, therefore it is most commonly used with “data-at-rest”, i.e. data that is stored in an archive or data warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Relative security of asymmetric encryption

A

More complicated, cumbersome, and secure than symmetric encryption. The transmission is more secure because only the private key can decrypt the message and only the user has access to the private key. It can have compatibility problems when using mobile technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly