Cryptography Unit 1: Attacks on Computer And Computer Security

Cryptography Unit 1: Attacks on Computer And Computer Security

Created by
@SprightlyVision

Questions and Answers

What is another term for symmetric key cryptography?

Symmetric encryption

Which type of cryptography uses two keys for encryption and decryption?

Asymmetric cryptography

What is the key difference between symmetric and asymmetric cryptography?

Number of keys used

Which type of cryptography is generally slower but more secure?

<p>Asymmetric cryptography</p> Signup and view all the answers

In stream ciphers, how does the key behave during encryption?

<p>Changes constantly</p> Signup and view all the answers

Which type of key is not revealed in asymmetric cryptography?

<p>Private key</p> Signup and view all the answers

What is the characteristic of the public key in asymmetric cryptography?

<p>Interchangeable between users</p> Signup and view all the answers

Which type of cryptography works on a single bit at a time?

<p>Stream ciphers</p> Signup and view all the answers

What is a characteristic of the private key in asymmetric cryptography?

<p>Used for decryption only</p> Signup and view all the answers

What aspect of encryption does asymmetric cryptography rely on?

<p>Public and private keys</p> Signup and view all the answers

More Quizzes Like This

Use Quizgecko on...
Browser
Browser