10 - Cryptography Flashcards
Authentication
Assurane that communicating entity is the one claimed
Access Control
prevention of the unauthorised use of resource
Data Confidentiality
Protection of data from unauthorised disclosure
Data Integrity
Assurance that data received is as sent by an authorised entity
Non-Repudiation
Protection against denial by one of the parties in a communication
Availability
resource accessible
Problems without Cryptography (4)
- Copy data from disk storage for remote analysis
- Passively listen on broadcast channels
- Aggressively monitor traffic through intermediate routers or workstations
- Actively replay, modify or insert their own messages into the message stream
Solutions to lack of Cryptography (4)
- User encrypt of files
- DL and NL: in switches and router (VPN)
- SL: end-to-end data conversion (SSL)
- AL: in programs such as email agents (PGP)
Ciphertext
Encrypted Plaintext
Plaintext
Decrypted CipherText
Symmetric Encryption
Encryption where the same key is used for encryption and decryption
Asymmetric Cryptography
Use of public key cryptography
- pub key used to encrypt and check signatures
- private key used to decrypt and sign
Hash
A “fingerprint” of a piece of text that will show if it has been altered
Digital Signature
A “fingerprint” that is produced with a private key of a pub/priv key pair
Ceaser Cipher Method
Each letter in the original message is replaced w/ a letter corresponding to a certain number of letters up/down the alphabet.