4.9.3 The Internet Flashcards
What is encryption?
The process of scrambling data so that it cannot be understood if intercepted.
What occurs in symmetric encryption?
- The sender and receiver share the same private key.
* This key is used to both encrypt and decrypt data sent between the two parties.
What occurs before data transmission in symmetric encryption?
• The sender and receiver must participate in a key exchange to ensure that they both have a copy of their shared key.
What is a flaw in symmetric encryption?
• If the key is shared over a network, the key is vulnerable to interception.
What is asymmetric encryption?
- When two devices communicate using asymmetric encryption, four different keys are used.
- Each device has a pair of mathematically related keys, one of which is kept secret ( private key ) and the other shared on the internet ( public key )
What happens when a message is encrypted with a public key?
Only the corresponding private key can decrypt it and vice versa.
What happens in asymmetric encryption before a message is sent?
- Before a message is sent it is encrypted by the sender using the recipient’s public key.
- This means that the message can only be decrypted by the corresponding private key: the recipient’s private key which only the recipient has access to.
- This means the recipient is the only one who can decrypt the message.
What is the purpose of digital signatures?
A digital signature can be used to verify the sender of a message and to verify that the message has not been tampered with during transmission.
How is the digest created?
The digest of a message is created by a hashing or checksum algorithm.
The value of the digest depends on the contents of the message and will not be the same if the message is changed.
What is the value of the digest dependent on?
The contents of the message.
How is the digest encrypted?
The digest is encrypted with the sender’s private key which anyone can decrypt using the sender’s public key.
How are the message and appended digest encrypted?
With the recipient’s public key, meaning only the recipient can decrypt the information.
What happens when the recipient receives the message via asymmetric encryption?
They first decrypt it using their private key leaving them with the decrypted message and an encrypted digest.
What happens when the recipient decrypts the message using their private key?
leaves them with:
• Decrypted message
• Encrypted Digest
How is the message verified as having been sent by the sender?
• As the digest is encrypted using the sender’s private key.
• It can only be decrypted using the sender’s public key.
This verifies that the message was really sent by the sender as only they have access to their private key.