Chapter 17 Flashcards
"Security"
encryption
process of changing plain text into cipher text
cipher text
data after encryption
plain text
data before encryption
public key
an encryption key that is shared with everyone involved in the process
private key
- an encryption key that is not shared with anyone
- it is used to decrypt data that was encrypted with its matching public key
similarities between private and public key
both used in asymmetric encryption
a pair of keys is required//matching pair
both are hashing algorithms
difference between private and public keys
private key is only known to the owner of the key pair, public key is available for everyone
public key is for encryption, private key is for decryption
purpose of encryption
to provide better security,
ensure the authenticity of the message
non-repudiation, neither sender nor receiver can deny the transmission’s occurrence
symmetric encryption
one key is used for both encryption and decryption
asymmetric encryption
two different keys are used for encryption and decryption, one private and one public.
- the message to be sent is encrypted using the receiver’s public key
- the message is decrypted using the receiver’s matching private key
- as the receiver is the only one with that private key, only the receiver can read the message.
explain the difference between symmetric and asymmetric encryption
- Symmetric cryptography uses a single key to encrypt and decrypt messages, Asymmetric cryptography uses two.
- The symmetric key is shared, whereas with asymmetric, only the public key is shared (and the private key isn’t).
- …asymmetric encryption is more secure.
- Symmetric cryptography is a simple process that can be carried out quickly, but asymmetric is more complex, so slower.
- The length of the keys in symmetric encryption are (usually) shorter than those for asymmetric (128/256 bits v 2048 bits).
security concerns for encryption
confidentiality = the receiver should be the only one to decipher the cipher text
authenticity = the receiver should be certain who sent the ciphertext
integrity = ensuring the cipher text has not been altered during transmission
handshake
when a device initiates communication with another device
handshake protocol
requests from the server its SSL certificate which is a digital certificate that confirms its identity. a session key is established that is used for the duration of the connection.
long answer:
client requests server’s digital certificate and public key
client validates certificate and sends their certificate (if requested)
client sends an encrypted message to the server (using server’s public key) to establish session key
session begins
security parameters determined during the handshake protocol
- which protocol will be used
- session ID (uniquely identifies the messages sent)
- encryption method
- compression method to be used