2.8 Flashcards
Cryptography
Authentication and access control
Confidentiality
Nonrepudiation
Integrity
Cryptananalysis
Cracking encryption
Cryptography keys
Added to encryption but its best to use biggest kep but sometime cant. So sometimes can hash the hashes password.. known as key stretching
There are libraries for key stretching bcrypt cypher or pbkdf2
Cryptography lightweight
Iot concepts, where crpytography uses least amount of power
Homomorphic encrpyrion
can perform
Calculations in encrypted form and saved in always encrypted form
Symmetric encryption
1 key to decrypt and same key to encrypt, shared secret key
Cant scale, like someone carrying a key cant share one person carries
Th
Asymmetric encryption
Have a public key and private key, can give to anyone share etc. only way to decrypt is with private key
So one key has one way
The key pair
Asymmetric key generator creates two separate keys one is public to be shared and private stays with us
Elliptic curve cryptography
Instead of numbers we use cirves to create keys, using smaller keys and use less storage and data.
Hashes
Message digest, a finger print, a one way trip that cant be undone can be used to store passwords
How to share keys privately
Out of band exchange, like telephone
Transit encryption like asymmetric to send symmetric
Perfect
Forward secrecy
Different encryption when keys are transfer for one session, to protect and make sure multi node travel doesnt show the same key
Steganography
Hide writing in an image, secirty through obscurity. The graphic is cover text.
Can do audio or video too
Quantum computing
Not upgrade but to add
Value, a new way to make calculations. Instead of bits we use qubits, that exist between 1 and zero and is both
Scalability is advantage
Quatum key distribution,
Sent keys in traffic with out worry cause its qubits