Common Cryptography Use Cases 6.1 Flashcards
Finding the Balance
Low power devices don’t have the power to to use large size cryptography. They use smaller symmetric key sizes and use elliptic curve cryptography for asymmetric encryption. If we have apps that require low latency, we use symmetric encryption with smaller key sizes to encrypt/decrypt quickly. If we need high integrity, we use larger key sizes, hashes, and strong encryption.
Use Cases
We use the encryption to keep data confidential. It’s common to use it on email, files, drives. We use it for integrity, to prevent data modification, validate the contents of what we receive, file downloads, and password storage. We also use it to hide data with obfuscation. Modern malware uses this to sneak the bad files onto your computer.
Use Cases Cont.
We also use cryptography for authentication. We hash passwords to protect the original password, and also add salt to randomize the stored password hash. Additionally we use it for non-repudiation (confirming authenticity). Digital signatures provide authenticity to our data. There is an ongoing balancing act of using the level of cryptography versus the constraints of our browsers/software.