Week 2 - Public Ker or Asymmetric Encryption Flashcards

1
Q

What’s the difference between asymmetric and symmetric encryption systems?

A

Asymmetric encryptions use different keys to encrypt and decrypt, symmetric uses the same key for both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s another name for asymmetric cryptography?

A

Public key ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s a public key signature?

A

A message is combined with the sender’s private key to generate a digital signature (to assure the receiver that the message was not tampered with and came from the actual sender)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the receiver do after receiving a message with a digital signature?

origin, combines message with

A

they can verify the message’s origin by combining the message with the digital signature and the sender’s public key (assuming they already exchanged public keys)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 3 concepts that an asymmetric cryptosystem grants us?

A
  1. Confidentiality (encryption, reverse, kept hidden)
  2. Authenticity (digital signature)
  3. Non-repudiation (message came from a person claiming to have written it)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which encrypting algorithm is faster, cheaper, and more efficient at encrypting larger amounts of data?

A

Symmetric encryption (but need to make sure you securely share the key/shared secret with the other party)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does MAC stand for?

A

Message Authentication Codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does MAC work?

A

a bit of information that allows authentication of a received message (to assure it did not come from a third party masquerading as the sender)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s the difference between MACs and digital signatures? (2)

A
  • Digital signatures use public key cryptography (then private key to decrypt) [Asymmetric]
  • MACs, the secret key used to generate the MAC is the same one used to verify it [Symmetric]
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MACs are more similar to what encryption system?

A

Symmetric encryption system

(secret key must be agreed upon by all parties beforehand, or shared)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly