Study smarter with Fiveable
Get study guides, practice questions, and cheatsheets for all your subjects. Join 500,000+ students with a 96% pass rate.
Encryption is the backbone of every secure digital interaction you'll encounter on the exam—from HTTPS connections to messaging apps to e-commerce transactions. You're being tested on your understanding of how data confidentiality, integrity, and authentication work together to create secure communication systems. The core tension in cryptography revolves around key management, computational efficiency, and security strength, and exam questions frequently ask you to evaluate trade-offs between these factors.
Don't just memorize algorithm names—know why each method exists and what problem it solves. Can you explain why we need both symmetric and asymmetric encryption? Do you understand why hash functions aren't technically encryption? These conceptual distinctions are exactly what FRQs target. Master the underlying principles, and you'll be able to tackle any scenario the exam throws at you.
The most important distinction in cryptography is between single-key and dual-key systems. Symmetric encryption uses one shared key for both encryption and decryption, while asymmetric encryption uses mathematically linked key pairs. Each approach solves different problems—and creates different vulnerabilities.
Compare: Symmetric vs. Asymmetric Encryption—both transform plaintext into ciphertext, but symmetric is faster while asymmetric solves the key distribution problem. If an FRQ asks how two strangers can communicate securely, asymmetric encryption (or hybrid systems) is your answer.
When applications need to encrypt large amounts of data quickly, they rely on standardized symmetric algorithms. AES has become the dominant standard because it balances security strength with processing efficiency.
Asymmetric systems derive their security from mathematical problems that are easy to compute in one direction but practically impossible to reverse. The security of these algorithms depends on computational difficulty, not secrecy of the method itself.
Compare: RSA vs. Diffie-Hellman—both use asymmetric mathematics, but RSA encrypts data directly while Diffie-Hellman only establishes shared secrets. Diffie-Hellman is often used to create keys that are then used with symmetric encryption.
Encryption alone doesn't guarantee that data hasn't been tampered with. Hash functions and digital signatures provide integrity verification and sender authentication—distinct security goals from confidentiality.
Compare: Hash Functions vs. Digital Signatures—hashes verify data integrity (has this file changed?), while digital signatures verify both integrity AND sender identity. Password databases store hashes; legal documents use digital signatures.
Individual algorithms combine into protocols that secure real-world communications. Modern security systems typically use hybrid approaches, combining asymmetric encryption for key exchange with symmetric encryption for data transfer.
Compare: TLS vs. End-to-End Encryption—TLS protects data in transit between you and a server (the server can read it), while E2EE protects data so that only the intended recipient can read it. Your bank uses TLS; Signal uses E2EE.
Current encryption methods face a future challenge from quantum computing. Quantum computers could theoretically break RSA and other asymmetric algorithms by solving factorization problems exponentially faster than classical computers.
| Concept | Best Examples |
|---|---|
| Symmetric encryption | AES, shared-key systems |
| Asymmetric encryption | RSA, Diffie-Hellman |
| Key exchange methods | Diffie-Hellman, RSA key transport |
| Data integrity verification | SHA-256, hash functions |
| Authentication & non-repudiation | Digital signatures |
| Secure communication protocols | TLS, HTTPS |
| Privacy-focused encryption | End-to-End Encryption |
| Future/emerging security | Quantum cryptography, QKD |
Why do most secure communication systems use both symmetric and asymmetric encryption rather than just one type? Identify a protocol that demonstrates this hybrid approach.
Compare hash functions and encryption: What can encryption do that hashing cannot, and what security goal do hash functions serve?
If a company claims their messaging app uses end-to-end encryption, what specifically does this mean about who can and cannot read your messages?
Both RSA and Diffie-Hellman are asymmetric methods—what is the key functional difference between them, and when would you use each?
Explain why quantum computing poses a threat to current encryption methods like RSA, and how quantum cryptography attempts to address future security needs.