Week 2 - Public Ker or Asymmetric Encryption Flashcards
What’s the difference between asymmetric and symmetric encryption systems?
Asymmetric encryptions use different keys to encrypt and decrypt, symmetric uses the same key for both
What’s another name for asymmetric cryptography?
Public key ciphers
What’s a public key signature?
A message is combined with the sender’s private key to generate a digital signature (to assure the receiver that the message was not tampered with and came from the actual sender)
What does the receiver do after receiving a message with a digital signature?
origin, combines message with
they can verify the message’s origin by combining the message with the digital signature and the sender’s public key (assuming they already exchanged public keys)
What are the 3 concepts that an asymmetric cryptosystem grants us?
- Confidentiality (encryption, reverse, kept hidden)
- Authenticity (digital signature)
- Non-repudiation (message came from a person claiming to have written it)
Which encrypting algorithm is faster, cheaper, and more efficient at encrypting larger amounts of data?
Symmetric encryption (but need to make sure you securely share the key/shared secret with the other party)
What does MAC stand for?
Message Authentication Codes
How does MAC work?
a bit of information that allows authentication of a received message (to assure it did not come from a third party masquerading as the sender)
What’s the difference between MACs and digital signatures? (2)
- Digital signatures use public key cryptography (then private key to decrypt) [Asymmetric]
- MACs, the secret key used to generate the MAC is the same one used to verify it [Symmetric]
MACs are more similar to what encryption system?
Symmetric encryption system
(secret key must be agreed upon by all parties beforehand, or shared)