Symmetric and Asymmetric Encryption

Cards (22)

  • What are the two types of encryption mentioned?
    Symmetric and asymmetric encryption
  • How does asymmetric encryption function?
    It uses different keys for encryption and decryption
  • What is the key feature of symmetric encryption?
    It uses the same key for encryption and decryption
  • When is symmetric encryption most appropriate to use?
    When data will not be transmitted
  • What is an advantage of symmetric encryption?
    The encryption algorithm runs more quickly
  • How does modern encryption compare to pre-computer era encryption?
    It is many orders stronger
  • What is a characteristic of asymmetric encryption algorithms?
    They involve more processing than symmetric algorithms
  • How can modern encryption be used by the general public?
    Without specialist knowledge, often unknowingly
  • In what scenario is asymmetric encryption commonly used?
    When exchanging sensitive data like credit card details
  • When is symmetric encryption best suited?
    When the same person encrypts and decrypts
  • What has the strength of encryption enabled on the Internet?
    Widespread use and support for e-commerce
  • What is a consequence of modern encryption for governments?
    They struggle to crack intercepted messages
  • What level of privacy does modern encryption provide individuals?
    Unprecedented levels of privacy
  • What is a downside of modern encryption for communication?
    Nefarious purposes can be conducted undetected
  • What is the difference between symmetric encryption, asymmetric encryption, and hashing?
    • Symmetric encryption: same key for encryption and decryption
    • Asymmetric encryption: two keys (public and private) for encryption and decryption
    • Hashing: one-way process, non-reversible, produces a fixed value
  • What does encryption do to data?
    It converts data into ciphertext
  • What is the purpose of hashing?
    To verify information without revealing it
  • How does symmetric encryption benefit robot data storage?
    No keys need to be shared or transmitted
  • What is a benefit of asymmetric encryption in robot communication?
    Only the public key needs to be shared
  • How can asymmetric encryption verify the identity of a sender?
    By using the public key for encryption
  • What is a limitation of hashing?
    It cannot return data to the original form
  • Why is encryption useful for data transmission?
    Intercepted data cannot be decrypted without the key