Encryption Concepts Flashcards Preview

Security+ GCGH Chapter 10, Understanding Cryptography and PKI > Encryption Concepts > Flashcards

Flashcards in Encryption Concepts Deck (7)
Loading flashcards...
1
Q

describe what a hash is used for and how in 2 points, and give an example method

A

1) it is used to ensure data integrity
2) it uses a compression algorithm to reduce the data to a fixed length
3) MD5 and SHA are example algorithms

2
Q

Fill in the below features of Asymetric encryption:

1) it uses a ___ ___ and a ___ ___
2) it requires a ___ to issue certificates
3) either key can ___ or ____ the data

A

1) it uses a public key and a private key
2) it requires a PKI to issue certificates
3) either key can encrypt or decrypt the data

3
Q

Encryption normally includes an algorithm and a …

A

key

4
Q

What’s the difference between a stream cipher and a block cipher?

A

stream ciphers encrypt one bit at a time, block ciphers encrypt blocks of data at a time

5
Q

What name is given to the principle of validating an identity?

A

authentication

6
Q

If you encrypt the hash of an email message with the senders private key, what have you created?

A

a digital signature

7
Q

only the sender’s xxxx xxxx can decrypt the hash of an email

A

public key
Remember, they encrypt it with the private key. Anyone should be able to decrypt it to check the hash is correct. The recipient gets the public key from the sender’s public certificate.