What are the attributes in encryption?
What are the information security objectives?
What are the elements of access control?
What is symmetric key cryptography?
In symmetric key cryptography, key k is used both for encryption (E) of plain text m and for decryption (d) of cipher text c
What are the problems related to symmetric key cryptography?
How is public key cryptography different compared to symmetric cryptography?
A pair of two related keys (PK, SK) are used and it does not matter if someone intercepts PKb because it is public
What are the advantages of public key cryptography?
Which methods are based on SP networks?
How do block ciphers work?
They use confusion (adding unknown key values) and diffusion
How does the Feistel cipher work?
It contains a ladder structure and input is split up into two blocks both containing a function, left half and right half,
Why do we have 3DES?
Because the key in DES was too short
Which type of encryption are out there?
Biometric
End-to-end
Quantum
Homomorphic
Blockchain
What is homomorphic encryption?
Fast transmission of highly classified material while keeping material highly secured
What is beneficial about blockchain?