Asymmetric Encryption Flashcards Preview

Security+ > Asymmetric Encryption > Flashcards

Flashcards in Asymmetric Encryption Deck (10):
1

In asymmetric encryption, what keys are used?

A paired public and private key

2

RSA

Secure asymmetric encryption using a minimum of 1,024 bit keys. Frequently used for digital signatures in e-mail. Uses a paired public and private key. Uses a static key.

3

What are static keys?

Semipermanent, can stay the same over a long period of time.

4

What are ephemeral keys?

Includes a private and public ephemeral key, re-created for each session.

5

What is Perfect forward secrecy?

PFS, indicates that random public keys are created for each session.

6

Where is Elliptic curve cryptography used?

Small wireless devices; does not take much processing power.

7

What is Diffie-Hellman?

Key exchange algorithm used to share a symmetric key between 2 parties. Supports static and ephemeral keys.

8

What is DHE?

Diffie-Hellman Ephemeral, uses ephemeral keys, and generates new keys for each session.

9

What is ECDHE?

Elliptic Curve DHE, uses ephemeral keys generated using ECC.

10

What is ECDH?

Elliptic Curve DH, uses ECC to generate static keys