Recall & Review
beginner
What is asymmetric encryption?
Asymmetric encryption uses two different keys: a public key to encrypt data and a private key to decrypt it. This allows secure communication without sharing the private key.
Click to reveal answer
beginner
What does RSA stand for and what is it used for?
RSA stands for Rivest-Shamir-Adleman, the inventors of this encryption method. It is widely used for secure data transmission by encrypting data with a public key and decrypting with a private key.
Click to reveal answer
intermediate
How does ECC differ from RSA?
ECC (Elliptic Curve Cryptography) uses smaller keys than RSA but provides similar security. This makes ECC faster and uses less computing power, ideal for mobile devices.
Click to reveal answer
beginner
Why is the private key kept secret in asymmetric encryption?
The private key is kept secret because it is used to decrypt messages encrypted with the public key. If someone else gets the private key, they can read all encrypted messages.
Click to reveal answer
beginner
What is a real-life example of asymmetric encryption use?
When you visit a secure website (https://), your browser uses asymmetric encryption to safely exchange a secret key with the website. This key then encrypts all data sent between you and the site.
Click to reveal answer
Which key is used to encrypt data in asymmetric encryption?
✗ Incorrect
In asymmetric encryption, the public key is used to encrypt data, while the private key is used to decrypt it.
What is a main advantage of ECC over RSA?
✗ Incorrect
ECC uses smaller keys and is faster, making it more efficient especially for devices with limited resources.
What happens if someone obtains your private key?
✗ Incorrect
The private key decrypts messages encrypted with the public key, so if stolen, encrypted data can be read by others.
RSA encryption is named after:
✗ Incorrect
RSA is named after its inventors: Ron Rivest, Adi Shamir, and Leonard Adleman.
Which of these is a common use of asymmetric encryption?
✗ Incorrect
Asymmetric encryption is often used to securely exchange keys that will then be used for faster symmetric encryption.
Explain how asymmetric encryption works using the example of sending a secret message.
Think about how you can send a locked box that only the receiver can open.
You got /4 concepts.
Compare RSA and ECC in terms of key size and efficiency.
Consider which method is better for mobile devices.
You got /4 concepts.