Symmetric
Asymmetric
SSL & TLS
Key Terms
Scenarios
100

How many keys are used for symmetric encryption?

One
100

How many keys are used for asymmetric encryption?

Two
100

This is the modern protocol used to secure web traffic.

TLS

100

This is the readable, original form of data before encryption.

Plaintext

100

One major reason asymmetric encryption is used in TLS even though it is slower is that it helps solve this problem.

Secure key exchange problem or initial trust problem

200

One big advantage of symmetric encryption is that it is generally ____________ compared to asymmetric encryption.

Faster

200

If Alice encrypts a message with Bob’s public key, only this key can decrypt it.

Bob's private key

200

When a browser shows a lock icon for HTTPS, it does not just mean encryption. It also suggests the browser successfully checked this.

Server’s identity or certificate validity

200

This is scrambled, unreadable data after it has been encrypted.

Ciphertext

200

A student says, “Since public keys are public, using them makes encryption insecure.” Explain why that logic is wrong.

Public keys are designed to be shared, and they do not let someone decrypt the message without the matching private key

300

One problem with symmetric encryption is safely __________ before communication starts.

Exchanging the key

300

This key is used to lock data so only the owner of the matching private key can unlock it.

Public key

300

A student says, “TLS is basically just encryption for websites.” Give the fuller answer by naming the three major protections TLS is meant to provide.

Confidentiality, authentication, and integrity

300

This kind of attack involves secretly listening to network traffic.

Sniffing / Eavesdropping

300

An attacker intercepts traffic between a victim and a fake website pretending to be a real one. Proper certificate validation is meant to help stop this type of problem.

Man in the middle attack

400

How do you measure the strength of an encryption algorithm?

Size of the key (Keyspace)

Work Factor (How much effort/time does it take to break)

Entropy (Level of randomness)


400

This is the main reason asymmetric encryption is not usually used for encrypting large amounts of data by itself.

It is slower

400

What are the two purposes of a digital certificate?

Prove identity

&

Share public key

400

This process confirms that a person or server is really who they claim to be.

Authentication

400

Should encryption algorithms be public or private? Explain why.

Public

Allows for public testing and peer review

If it survives, you know its good

500

Two branch offices already share a secret key, but that key is reused for months across many communications. Even if symmetric encryption itself is strong, this practice creates a security concern because compromise of that one key affects this.

All communications protected by that key

500

A company wants confidentiality, identity verification, and efficient performance in a web session. Explain why asymmetric encryption alone is usually not the best full-session solution.

It helps with secure key exchange and authentication, but it is too slow or inefficient for protecting all session data by itself

500

Name and explain one SSL/TLS vulnerability?

SSL Stripping

Certificate Authority Fraud

Capturing Data Before Encryption

500

Protocol used to transfer data from a client to a web server

HTTP

500

A student says, “If TLS already uses encryption, there is no need to teach both symmetric and asymmetric encryption separately.” Explain why that statement is wrong using the actual way secure web sessions work.

TLS depends on both

Asymmetric methods help authenticate identities and securely establish shared secrets, while symmetric encryption protects the actual session data efficiently. You need both concepts to understand how TLS works.