1.4 Cybersecurity Cryptography: Encryption and Public Key Infrastructure Flashcards

(23 cards)

1
Q

What is the definition of Public Key Infrastructure (PKI)?

A

A system of policies, procedures, hardware, and software responsible for creating, distributing, managing, storing, revoking, and processing digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of Public Key Infrastructure (PKI)?

A

To establish trust by associating a certificate to people or devices, often in conjunction with a Certificate Authority (CA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Certificate Authority (CA)?

A

A trusted entity that issues digital certificates and vouches for the identity of the entities to whom it issues certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is symmetric encryption?

A

An encryption method where the same single secret key is used for both encrypting plaintext into ciphertext and decrypting ciphertext back into plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are two alternative terms for symmetric encryption?

A
  • Secret key algorithm
  • Shared secret
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the main scalability challenge associated with symmetric encryption?

A

The difficulty in securely sharing and managing the single secret key among a growing number of individuals or devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is symmetric encryption still widely used despite its scalability issues?

A

It is very fast and has low computational overhead compared to asymmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is asymmetric encryption?

A

An encryption method that uses two different, mathematically related keys: a public key for encryption and a private key for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the roles of the public key and private key in asymmetric encryption?

A
  • Private Key: Exclusively held by one person or device, used for decryption.
  • Public Key: Freely distributed and available to anyone, used for encryption.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the encryption process, whose public key does Bob use to send a message to Alice?

A

Alice’s public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Whose private key is used to decrypt the message sent from Bob to Alice?

A

Alice’s private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Can a private key be derived from its corresponding public key?

A

No, it is impossible to derive or reverse-engineer the private key from the public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is key escrow?

A

The practice of storing copies of cryptographic keys with a third party or within an organizational system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why might an organization implement key escrow?

A

To maintain access to encrypted data for business continuity, such as when an employee leaves or for compliance with data access requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is it important to protect a private key with a password?

A

To add an additional layer of security and prevent unauthorized access to the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: Symmetric encryption uses the same _______ for both encryption and decryption.

17
Q

What is the key management challenge in organizations regarding asymmetric encryption?

A

Managing hundreds or thousands of public/private key pairs.

18
Q

What are digital certificates?

A

Electronic documents used to prove the ownership of a public key.

19
Q

What does the term ‘key pair’ refer to in asymmetric encryption?

A

The set of two mathematically related keys (public and private) generated simultaneously.

20
Q

What is the ‘power and magic’ of asymmetric cryptography?

A

Anyone with the public key can encrypt data, but only the holder of the corresponding private key can decrypt it.

21
Q

What is the scalability problem in symmetric encryption?

A

The complexity of distributing keys to everyone who needs to decrypt data and tracking which key belongs to whom.

22
Q

What is the key generation process in asymmetric encryption?

A

The simultaneous creation of a public and private key pair, often involving randomization and large prime numbers.

23
Q

True or False: Asymmetric encryption uses the same key for both encryption and decryption.