Encryption and Secure Exchanges Flashcards

1
Q

Define “ciphertext”.

A

Text that has been mathematically scrambled so that its meaning cannot be determined without the use of an algorithm and key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the use of secure electronic transactions (SET) protocols.

A

A protocol that is often used in credit card payments. Used by the merchant to securely transmit payment information and authenticate trading partner identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define “encryption”.

A

The process of coding data so that it cannot be understood without the correct decryption algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe symmetric encryption (also called single-key encryption or private-key encryption).

A

Uses a single algorithm to encrypt and decrypt. Sender uses the encryption algorithm to create the cipher text an sends the encrypted text to the recipient. Sender tells recipient which algorithm was used to encrypt. The recipient uses the algorithm to decrypt. Common in data storage applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identify the two internet protocols that are typically used for secure Internet transmission protocols.

A

Sensitive data sent via the internet is usually secured by one of two encryption protocols: SSL (Secure Sockets Layer) or S-HTTP (Secure Hypertext Transport Protocol).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe how digital signatures work.

A

Uses public/private key pair technology to provide authentication of the sender and verification of the content of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define “cleartext (or plaintext)”.

A

Text that can be read and understood.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe how digital certificates work.

A

Provides legally recognized electronic identification of the sender and verifies the integrity of message content. Based on public/private key technology (like the digital signature).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe asymmetric encryption (also called public/private-key encryption and private-key encryption).

A

Uses two paired encryption algorithms to encrypt and decrypt the text: if the public key encrypts, the private key decrypts. If the private key encrypts, the public key decrypts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly