Chapter 3 Cryptography Flashcards
Cryptography
protection & preservation of info in all its forms
Old Techniques
Steganography - concealing msgs in non-secret text Encryption - manipulate & protect data Cryptanalysis - uncover secrets others try to hide
Cryptography focuses on
1) Confidentiality Cryptography - primary goal; prevent unauthorized access; should not be able to reverse encryption unless user possesses correct key
2) Integrity Cryptography - helps detect changes in information (Hashing)
3) Authentication Cryptography - positively identifying user;
4) Nonrepudiation - ability to provide positive identification of source; (most common app is digital signatures) 5) Key Distribution - most valuable components; represents the specific code to encrypt or decrypt data
RSA
named after its creators, is a public-key cryptosystem built onto current OS’, secure telephones, Ethernet cards, etc for both encryption & authentication
Cryptography terms
1) Plaintext/Cleartext - original msg that has not been altered; usable information; (Caesar’s Cipher is an example, where letters are displaced to a certain position) plaintext can be anything, doesn’t have to make sense to you
2) Ciphertext - opposite of plaintext, msg that has been transformed into a different form using an algorithm; also can be reversed using algorithm & key
3) Algorithm’s Cipher - the algorithm to change plaintext to ciphertext & reverse
4) Keys - discrete piece of information used to determine meaningful result of cryptographic operation
Types of cryptography
1) Symmetric Cryptography
2) Asymmetric Cryptography (public key cryptography)
Symmetric Cryptography
Same key is used encrypt/decrypt; -PROS: [P]reserving confidentiality, [I]ncreasing speed, [P]roviding authenticity, [E]nsuring simplicity -CONS: Key mgmt issues, Lack of nonrepudiation features (i.e. Rijindael or Advanced Encryption Standard (AES) is used by U.S. to encrypt govt files)
Assymetric Cryptography
public key system that features key pair: public & private key; The public key is published somewhere, whereas private is always in user’s possession; Both keys can encrypt, but only private can reverse process; Keys must be associated w/ user in trusted manner; -PROS: has nonrepudiation; Key distribution benefits; improved privacy, security, & authentication (i.e. Hash Function) -EXAMPLE: Alice wants to send a private message to Bob so she locates Bob’s public key to encrypt the message, now only Bob’s private key can decrypt. (Everyone’s public key is known) -If Alice uses her private key to encrypt, then that is where digital signatures come into play; Now when Bob receives the msg, he needs to locate Alice’s public key & use it to verify the private key was used, if reversed, that means the msg came from Alice, if can’t be reversed, it didn’t come from Alice
Hash function (Hashing)
ONE WAY used in both creating & verifying digital signature; it is an algorithm that creates a digital fingerprint in the form of a hash value/result of a FIXED length (which is usually
PKI
Public Key Infrastructure - an arrangement that binds public keys with respective user by means of CA (certificate authority)
How do you know who owns a key?
To bind a key to specific signer/s, Certification Authorities (CAs) issue digital certificate Recipient uses public key listed in certificate to verify that the digital signature was created with the corresponding private key
Digital Certificate
an electronic credential unique to a person, computer, or service; sealed object populated with various pieces of info principal function is to bind key pair with particular subscriber; if conditions violated, certificate must be revoked
Signing certificate
generate a hash value & encrypt it w/ issuer’s private key For an attacker to compromise, they would need private key of the server or private key of issuer
Authenticating the certificate
A digital certificate replaces other forms of authenticating; A user who presents the credential must have method in place to validate credentials, one method is the CA, after a series of steps, digital signature can take place
CA
A certificate authority creates & revokes certificates that it has in its control along with the associated public keys; it is a trusted third party responsible for issuing, managing, identifying, & revoking certificates PLUS enrolling parties for their own certificates