Encryption and Hashing Flashcards

1
Q

Symmetric Encryption

A

Encryption that uses the same key to both encrypt and decrypt.
USES - Encrypted Harddrives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric Encryption

A

Encryption where different keys encrypt and decrypt the data

USES - Online transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Client-Server Communication

A

The client generates a session key and uses the public key to encrypt it -> The server decrypts the session key with the private key -> Client-Server now communicate using symmetric encryption with the session key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Private Key

A

The private key consists of 2 very large prime numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Public Key

A

The public key is the product of the 2 prime numbers making the private
key. As no efficient non-quantum integer factorisation algorithm exists, it is practically impossible to
crack the private key by brute force.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hashing

A

Using an algorithm to map data of any size to a fixed size. Unlike encryption, hashing cannot be undone, it is therefore a lossy
process.
Uses:
• Rapid data access in a hash table
• Error checking and corruption detection - such as downloads
• Password verification - the plaintext password would not have to be stored
A good hash algorithm:*
• Same message = Same hash
• Quick to compute
• Impossible to generate a message from the hash
• A small change = a big hash change
• Impossible to find 2 messages with the same hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly