2.8 Cryptographic Concepts Flashcards
Define cipher
Algorithm for encrypting/decrypting text, publicly known
Define key
Information added to the cipher to encrypt/decrypt data, private since having this allows the encryption/decryption of data
5 Steps of Digital Signature (using e-mail as an example)
- Sender generates a hash of the entire plain text of the message
- Sender encrypts the hash using his/her private key
- Recipient receives message in plain text + encrypted hash
- Recipient decrypts the hash using Sender’s public key
- Recipient hashes the message and compares it to the hash decrypted from sender
How does key length relate to security of encrypted data?
A longer key length produces more secure encryption
Define key stretching + 2 libraries/algorithms
- Making a small encryption key larger by hashing it multiple times
- Bcrypt, PBKDF2
Define hashing (3)
- Output value generated from algorithm based on input data
- Irreversible
- Should produce unique values if provided the same input multiple times
What is a hashing collision and what algorithm commonly produces them?
- When the same output value occurs for different input
- MD5
Define salt
A random value added to input data before hashing
2 security benefits of salt
- Prevents hash collisions
- Makes brute force attacks, such as Rainbow Tables less effective
Define symmetric encryption
A single key is used to encrypt/decrypt data
2 challenges with symmetric encryption
- Securely sharing the key
- Scalability - hard to share key with many parties
Define asymmetric encryption (2)
- AKA public-key cryptography
- Uses multiple keys, public and private
2 Encryption/Decryption paths with asymmetric encryption
- Data encrypted with private key can be decrypted by anyone with the public key
- Data encrypted with public key can only be decrypted whoever has the private key
What is difference between private and public keys?
Public key can be shared with anyone, private key must be kept confidential
What is the main disadvantage of asymmetric encryption?
Requires more CPU work to generate