GCGA Ch. 10 Introducing Cryptography Concepts (ST) Flashcards
(7 cards)
Integrity
provides assurances that data has not been modified. Hashing ensures that data has retained integrity.
Symmetric encryption
uses the same key to encrypt and decrypt data.
Asymmetric encryption
uses two keys (public and private) created as a matched pair.
Digital signature
provides authentication, non-repudiation, and integrity. Users sign emails with a digital signature, which is a hash of an email message encrypted with the sender’s private key. Only the sender’s public key can decrypt the digital signature which reveals hash, providing verification the hash was encrypted with the sender’s private key.
Authentication
validates an identity.
Non-repudiation
prevents a party from denying an action.
Confidentiality
ensures that data is only viewable by authorized users. Encryption protects the confidentiality of data.