1.5 Network Encryption Flashcards

1
Q

Define Encryption

A

Converting information into a code to prevent unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Hash Function

A

A function used to map data into a fixed size. It is a one-way function, used only to ecnrypt the data into a hash.

A reciever can convert the data to the hash and if it doesnt line up, then the data has been tampered with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Symmetric Encryption?

A

Both the sender and reciever must have the same key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an example of a Symmetric Encryption Protocol?

A

Data Encryption Standard (DES) - no longer secure

Advanced Encryption Standard (AES) - secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe Asymetric Encryption

A

Addresses the problem with symmetric key encryption that two users need a secure way to pass the key.

Uses two keys to encrypt/decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe Public Key Encryption.

A

Private key is known only to your computer only decrypts.

Public key is given out freely and only encrypts.

The keys are linked mathematically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do PKI Digital Signatures work?

A

They generate a hash and encrypt it using their private key. Sender encrypts message with a public key.

Reciever decrypts the message and generates a hash and decrypts the sender’s hash with the public key. They then compare their hash and the senders hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an example of a digital signature protocol?

A

RSA

Fast and simple encryption.

Slow signing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Diffie Hellman Algorithm?

A

A method of securely exchanging cryptographic keys over a public channel.

Allows two parties that hav eno prior knowledge of each other to jointly establish a shared secret key over an insecure channel.

ADD TO THIS BASED ON YOUTUBE VIDEO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does PGP work?

A

Pretty Good Protection

Creates a one-time only secret key based on movements of your mouse and keystrokes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is PGP?

A

Message is encrypted with a session key.

The session key is encryped with a public key.

Both are sent.

Essentially a double encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the advantage of PGP?

A

Combines convenience of public key encryption with the speed of conventional encryption.

Conventional encryption is 1000 times faster than public key encryption. With PGP you can encrypt the big main message conventionally and only encrypt a small session key with the public encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a thin client?

A

Processing is done on remote hardware on a server. You are just interfacing with it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is thick client

A

Processing done on local hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly