Chapter 17 Flashcards

"Security"

1
Q

encryption

A

process of changing plain text into cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

cipher text

A

data after encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

plain text

A

data before encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

public key

A

an encryption key that is shared with everyone involved in the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

private key

A
  • an encryption key that is not shared with anyone
  • it is used to decrypt data that was encrypted with its matching public key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

similarities between private and public key

A

both used in asymmetric encryption
a pair of keys is required//matching pair
both are hashing algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

difference between private and public keys

A

private key is only known to the owner of the key pair, public key is available for everyone

public key is for encryption, private key is for decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

purpose of encryption

A

to provide better security,
ensure the authenticity of the message
non-repudiation, neither sender nor receiver can deny the transmission’s occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

symmetric encryption

A

one key is used for both encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

asymmetric encryption

A

two different keys are used for encryption and decryption, one private and one public.

  • the message to be sent is encrypted using the receiver’s public key
  • the message is decrypted using the receiver’s matching private key
  • as the receiver is the only one with that private key, only the receiver can read the message.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

explain the difference between symmetric and asymmetric encryption

A
  • Symmetric cryptography uses a single key to encrypt and decrypt messages, Asymmetric cryptography uses two.
  • The symmetric key is shared, whereas with asymmetric, only the public key is shared (and the private key isn’t).
  • …asymmetric encryption is more secure.
  • Symmetric cryptography is a simple process that can be carried out quickly, but asymmetric is more complex, so slower.
  • The length of the keys in symmetric encryption are (usually) shorter than those for asymmetric (128/256 bits v 2048 bits).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

security concerns for encryption

A

confidentiality = the receiver should be the only one to decipher the cipher text

authenticity = the receiver should be certain who sent the ciphertext

integrity = ensuring the cipher text has not been altered during transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

handshake

A

when a device initiates communication with another device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

handshake protocol

A

requests from the server its SSL certificate which is a digital certificate that confirms its identity. a session key is established that is used for the duration of the connection.

long answer:
client requests server’s digital certificate and public key
client validates certificate and sends their certificate (if requested)
client sends an encrypted message to the server (using server’s public key) to establish session key
session begins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

security parameters determined during the handshake protocol

A
  • which protocol will be used
  • session ID (uniquely identifies the messages sent)
  • encryption method
  • compression method to be used
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

secure socket layer (SSL) protocol

A

when a user logs onto a website, SSL encrypts the data and only the client’s computer and the webserver are able to make sense of what is being transmitted

initiates handshake protocol
during this process the client and browser establish a session key that they use for the duration of their connection

17
Q

ssl process

A

handshake protocol first establishes a connection and confirms identity - the client browser requests its SSL certificate (a digital certificate confirming its identity) and its public key

  • if the digital certificate is valid (checks cert through list of certificate authorities) then the session is created, if it is invalid the website is rejected.

client browser then creates and sends the server a symmetric session key using the server’s public key

server uses their private key to decrypt the session key, and sends an acknowledgement (encrypted)

  • the session key is used to encrypt the data throughout session
18
Q

function of ssl

A

created to reassure a user when a client-server application is underway. its purpose is:
- Encryption of data
- Compression of data
- Integrity checking of data

19
Q

transport layer security (TLS)

A

provides secure communication over a network.
maintains data integrity and adds a layer of security (more secure than SSL)
composed of two layers - record protocol and handshake protocol

20
Q

record protocol (not in spec?)

A

contains the data being transmitted over the network

21
Q

differences between SSL and TLS

A

it’s possible to extend TLS by adding new authentication methods unlike SSL
TLS separates the handshaking process from the record protocol layer where all data is held

22
Q

examples of when ssl/tls is used:

A

banking
private/secure email
online shopping
secure file transfer
using a social networking site - audio chatting, instant messaging.

23
Q

digital signature

A

an agreed hash function is applied to a message (creating a digest), which is then encrypted using the sender’s private key to form a digital signature. used to identify a sender

24
Q

digital signature process

A
  • Cryptographic one-way hashing algorithm (agreed upon hashing algorithm) is used on the message to create a message digest
  • The sender’s private key is then used to encrypt the message digest, which becomes the digital signature.
  • the message and digital signature are encrypted with the receiver’s public key (asymmetric), and are sent
  • The receiver decrypts the message and digital signature using the receiver’s private key (asymmetric)
  • the digital signature is then decrypted with the sender’s public key to recover the message digest
  • The receiver uses the same hash function on the decrypted message and compares the two
  • If they are identical, the sender’s identity is verified and the message has not been altered.
25
Q

digital certificate

A

a data file that provides authentication through the CA.

26
Q

how is a digital certificate obtained

A
  • an application is filed to the local CA (certificate authority)
  • with some proof of identity e.g. organization name and the information required by the CA
  • organization also hands over its public key (depends on question)
  • identity is checked by a registration authority
  • if it’s verified, the CA generates the certificate, with the CA’s digital signature and name verifying the certificate.
  • the digital certificate is issued and handed back to be used.
27
Q

items in the digital certificate

A

serial number (unique)
certificate authority that issued certificate
certificate authority digital signature
name of the owner of certificate
the owner’s public key
period of validity of certificate
agreed hashing algorithm

28
Q

how is a digital certificate used to create a digital signature?

A

Instead of making the public key available for everyone, the sender could send the public key to a CA for optimum security.

the CA creates a digital certificate which contains the public key with proof of ownership of the public key

Anyone wishing to use the public key obtains it from the digital certificate

a message encrypted with the public key could be sent to the owner of the private key

that owner could use it to create a digital signature that can be used to authenticate a message

29
Q

purpose of quantum cryptography

A
  • to send virtually un-hackable messages …
  • … by using the laws / principles of quantum mechanics / properties of photons
  • detects eavesdropping
  • …because the properties of the photons change
  • to protect security of data transmitted over fibre optic cables
  • to enable the use of longer keys.
30
Q

quantum cryptography

A

(the direction each photon vibrates in is called its polarisation. A photon can polarised to represent a value for a bit - two ways to represent a 1 and two ways to represent a 0.)

process:
Sender generates photons
Sender sends photons through a random sequence of polarizers
Receiver sends photons to a randomly generated sequence of beam splitters
sender informs receiver of used sequence (polarisation basis)
the receiver informs which ones matched.
for each matched value there is now a stored bit.
receiver then discards other photon signals

31
Q

benefits of quantum cryptography

A
  • impossible to intercept without alterting either side that there has been an interception due to the nature of the photons/laws of physics
    • furthermore photons would be destroyed by the attempt (more secure)
  • performance of quantum cryptography is continuously improved
  • integrity of the key once transferred can be guaranteed
  • longer keys can be used
  • eavesdropping can be detected (changes the state of photon)
32
Q

drawbacks of quantum cryptography

A
  • requires dedicated quantum fibre optic line and specialist equipment which are difficult and expensive to implement.
  • has a limited range - currently only works over relatively short distances
  • polarisation of light can change during the transmission due to poor conditions
  • can be utilized by criminals to hide their activities