17 - security Flashcards

1
Q

why is encryption needed

A
  • reduce risk of eavesdroppers understanding data that is sent over a network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

security concerns about data transmission

A
  • confidentiality - only intended receipt can understand
  • authenticity - identifies the source is legitimate
  • integrity - data isn’t changed
  • non repudiation - neither sender nor receiver can deny transmission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

plaintext

A

original data being sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

cipher text

A

once plaintext has gone through an encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

block cipher

A
  • normally used when encrypting
  • the algorithm is applied to a group of contiguous bits - rather than one at a time
  • the plaintext is XORed with the previous cipher text
  • prevents identical plaintext making the same cipher text
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

stream cipher

A
  • encryption algorithm is applied to one bit at a time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

block chaining

A
  • the plaintext is XORed with the previous cipher text - before encryption
  • prevents identical plaintext making the same cipher text
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

symmetric encryption

A

uses the same key to encrypt and decrypt the encoded message
- use longer key to make it harder to crack
- key has to be sent to the recipient - key distribution problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

key distribution problem

A

in symmetric encryption the sender has the send the key to the recipient as they use the same key - this could be intercepted and used to decrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

asymmetric encryption

A
  • uses 2 keys - public + private - public is available to all and private is known only to a person/ computer
  • receiver generates 2 keys - are
    mathematically linked but cannot be derived
  • sends public key to sender
  • sender encrypts document with public key
  • sends document and receiver decrypts using private key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

asymmetric encryption

A
  • if 2 way communication is required between multiple people they all need to generate their own matching public and private keys
  • and swap all public kets so they can send encrypted files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

quantum cryptography

A
  • uses photons and their quantum properties to produce virtually unbreakable encryption
  • uses a quit (quantum bit) as the unit of data
  • can be 0 or 1 but also both
  • put through a polarising filter to make it one direction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

quantum key distribution

A
  • sending encryption keys across a network uses quantum cryptography – a quantum key
    distribution (QKD) protocol
    eg BB84
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

stages of quantum cryptography

A
  • use light to generate photons
  • sent through 4 random polarisers - randomly give one of 4 bit values
  • this travels along fibre optic to its destination
  • at the destination there are 2 splitters (diagonal or vertical/horizontal)
  • one is chosen at random and detectors are read
  • repeated until the whole key is sent
  • recipient send back sequence of splitters
  • sender compares to the polarisation sequence - and confirms where was correct
  • ensures they are synchronised
  • key is now sent safely
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

advantages of quantum cryptography

A
  • unbreakable
  • eavesdropping detection
  • longer key generated
  • future proof - quantum comps can crack classical encryption easily
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

drawbacks of quantum cryptography

A
  • requires a dedicated line and specialist hardware - expensive
  • limited range
  • polarisation can be changed as it travels due to interference
  • terrorists and other
    criminals can use the technology to hide their activities from government law enforcers
17
Q

SSL and TLS

A
  • use the standard cryptographic protocols to ensure there is a secure and authenticated communication between client and server
  • ensure no third party can eavesdrop
18
Q

SSL

A
  • encrypts data - agrees which encryption to use
  • compresses data - reduces amount transmitted
  • data integrity checks - need digital certificate
    shown by https or a small closed padlock
19
Q

uses of SSL and TLS

A
  • online banking and finance
  • online shopping
  • sending and recieving emails
  • cloud storage
  • VPNs
20
Q

TLS

A
  • modern more secure version of SSL
  • provides encryption, authentication and data integrity
  • 2 layers - record and handshake protocol
21
Q

record protocol

A

can be used with/ without encryption - contains dat abeing transmited over the network

22
Q

handshake protocol

A
  • permits the web server and client to authenticate each other and make use of encryption algorithms
  • establishes a secure session between client and server
23
Q

why is TLS used

A
  • possible to extend by adding new authentication methods
  • can use session caching improving performance
  • separates handshake from the record protocol where all data is held
24
Q

session caching

A
  • when opening a session it requires computer time - due to complex cryptographic processes
  • session caching means less comp time is needed for each connection
  • TLS can establish a new session or resume an existing session
25
Q

hows SSL/TLS are used once client types in URL

A
  • the clients browser requests the pages from the web server
  • the server sends back the digital certificate
  • the client checks the: digital signature, start and end dates, and domain
  • once the browser trusts the certificate the public key is used to generate a temporary session key
  • the session key is sent to the server
  • server uses its private key to decrypt the session key and sends back acknowledgement
  • communication can now take place
26
Q

public key infrastructure

A

a set of protocols, standards and services that allow clients and servers to authenticate each other using digital certificates
digital signatures follow the same protocol
requires the provider to use an encryption algorithm to generate keys

27
Q

digital signature

A

a way of validating authenticity of digital documents and identifying sender

28
Q

methods to make a digital signature

A
  • use the private key - unique to sender
  • hash the message to make a digest then encrypt with the private key - once received has the plaintext and if it matches then the document is sent correct
29
Q

making digital signature via digital certificate

A
  • condensing the digital certificate
  • put it through a hashing algorithm
  • then encrypt with the CA’s private key
30
Q

digital certificate

A
  • is an electronic document used to prove online identity of website or person
  • contains public key and info identifying owner
  • issued by the certificate authority (CA) - 3rd party identifier
31
Q

whats found on a digital certificate

A
  • version number
  • name of issuer
  • validity (start and expiry date)
  • public key
  • company details
  • issuers identifier
  • digital signature
  • serial number
32
Q

how to apply for digital certificate

A
  • request made using online form - send public key and user id
  • companies user id is verified by CA
  • digital certificate is generated for the user
  • sent back to the applicant - contains public key, CA id, user id, digital signature etc.