0
0
Cybersecurityknowledge~5 mins

Asymmetric encryption (RSA, ECC) in Cybersecurity - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is asymmetric encryption?
Asymmetric encryption uses two different keys: a public key to encrypt data and a private key to decrypt it. This allows secure communication without sharing the private key.
Click to reveal answer
beginner
What does RSA stand for and what is it used for?
RSA stands for Rivest-Shamir-Adleman, the inventors of this encryption method. It is widely used for secure data transmission by encrypting data with a public key and decrypting with a private key.
Click to reveal answer
intermediate
How does ECC differ from RSA?
ECC (Elliptic Curve Cryptography) uses smaller keys than RSA but provides similar security. This makes ECC faster and uses less computing power, ideal for mobile devices.
Click to reveal answer
beginner
Why is the private key kept secret in asymmetric encryption?
The private key is kept secret because it is used to decrypt messages encrypted with the public key. If someone else gets the private key, they can read all encrypted messages.
Click to reveal answer
beginner
What is a real-life example of asymmetric encryption use?
When you visit a secure website (https://), your browser uses asymmetric encryption to safely exchange a secret key with the website. This key then encrypts all data sent between you and the site.
Click to reveal answer
Which key is used to encrypt data in asymmetric encryption?
ANo key
BPrivate key
CPublic key
DBoth keys
What is a main advantage of ECC over RSA?
AFaster and uses less computing power
BLess secure
CUses larger keys
DOnly works on desktops
What happens if someone obtains your private key?
AThey can encrypt messages to you
BThey can decrypt your encrypted messages
CThey can only send emails
DNothing happens
RSA encryption is named after:
ARivest, Shamir, and Adleman
BRandom Secure Algorithm
CRapid Security Access
DReliable Secure Application
Which of these is a common use of asymmetric encryption?
ASpeeding up internet connection
BEncrypting files on your computer only
CCompressing data
DSecurely exchanging keys over the internet
Explain how asymmetric encryption works using the example of sending a secret message.
Think about how you can send a locked box that only the receiver can open.
You got /4 concepts.
    Compare RSA and ECC in terms of key size and efficiency.
    Consider which method is better for mobile devices.
    You got /4 concepts.