Encryption

Description

A level Computer Science (Compression, Encryption, & Hashing) Flashcards on Encryption, created by Malachy Moran-Tun on 06/12/2022.
Malachy Moran-Tun
Flashcards by Malachy Moran-Tun, updated more than 1 year ago More Less
Malachy Moran-Tun
Created by Malachy Moran-Tun over 1 year ago
Malachy Moran-Tun
Copied by Malachy Moran-Tun over 1 year ago
Malachy Moran-Tun
Copied by Malachy Moran-Tun over 1 year ago
1
0

Resource summary

Question Answer
What is Encryption? > Process of scrambling data so that is cannot be read by third parties > Done so by using a specific algorithm > Only the intended recipient should know how to decode the data
What is a Key in Encryption? > A pair of very large prime numbers, usually 256 or 1,024 bits long, that the encryption algorithm depends upon to encrypt / decrypt data > It would take an impractical amount of time to guess the key
Why is Encryption Important in Wireless Communication? > Wireless information can be intercepted by anyone, unlike wired communication, which requires a physical connection > Wireless protocols, such as WPA2, encrypt all traffic to prevent this
What is Symmetric Encryption? > The same key is used to encrypt and decrypt data > This encryption is usually done via a cypher algorithm > Both the encrypted data and private key is transferred
What is the Problem with Symmetric Encryption? > Anyone with the key can decrypt the data > The key could be intercepted to decrypt the data
What is Asymmetric Encryption? > Uses two keys: a public key and a private key, related to each other through mathematical operations > The public key is given to the sender by the recipient > This public key is one-way, i.e., it can only encrypt and not decrypt the data > The private key can decrypt the data previously encrypted by the public key. This must never be shared.
Show full summary Hide full summary

Similar

Computing Hardware - CPU and Memory
ollietablet123
SFDC App Builder 2
Parker Webb-Mitchell
Data Types
Jacob Sedore
Intake7 BIM L1
Stanley Chia
Software Processes
Nurul Aiman Abdu
Design Patterns
Erica Solum
CCNA Answers – CCNA Exam
Abdul Demir
Abstraction
Shannon Anderson-Rush
Spyware
Sam2
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Data Analytics
anelvr