Common Cryptography Use Cases 6.1 Flashcards

1
Q

Finding the Balance

A

Low power devices don’t have the power to to use large size cryptography. They use smaller symmetric key sizes and use elliptic curve cryptography for asymmetric encryption. If we have apps that require low latency, we use symmetric encryption with smaller key sizes to encrypt/decrypt quickly. If we need high integrity, we use larger key sizes, hashes, and strong encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Use Cases

A

We use the encryption to keep data confidential. It’s common to use it on email, files, drives. We use it for integrity, to prevent data modification, validate the contents of what we receive, file downloads, and password storage. We also use it to hide data with obfuscation. Modern malware uses this to sneak the bad files onto your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Use Cases Cont.

A

We also use cryptography for authentication. We hash passwords to protect the original password, and also add salt to randomize the stored password hash. Additionally we use it for non-repudiation (confirming authenticity). Digital signatures provide authenticity to our data. There is an ongoing balancing act of using the level of cryptography versus the constraints of our browsers/software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly