Asymmetric Encryption Flashcards

1
Q

In asymmetric encryption, what keys are used?

A

A paired public and private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RSA

A

Secure asymmetric encryption using a minimum of 1,024 bit keys. Frequently used for digital signatures in e-mail. Uses a paired public and private key. Uses a static key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are static keys?

A

Semipermanent, can stay the same over a long period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are ephemeral keys?

A

Includes a private and public ephemeral key, re-created for each session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Perfect forward secrecy?

A

PFS, indicates that random public keys are created for each session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where is Elliptic curve cryptography used?

A

Small wireless devices; does not take much processing power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Diffie-Hellman?

A

Key exchange algorithm used to share a symmetric key between 2 parties. Supports static and ephemeral keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is DHE?

A

Diffie-Hellman Ephemeral, uses ephemeral keys, and generates new keys for each session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is ECDHE?

A

Elliptic Curve DHE, uses ephemeral keys generated using ECC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ECDH?

A

Elliptic Curve DH, uses ECC to generate static keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly