Cryptography and Privacy (Week 14) Flashcards
What is Computer Security?
Computer Security means protection of computer systems from…
* Theft or damage of hardware, software and data
* Disruption or misdirection of services
What is the challenge of Data Privacy?
The challenge of Data Privacy is to…
* use data while
* protecting an individual’s privacy preferences and their personally identifiable information (PII)
How to Protect Data Privacy?
Most systems and services are designed to collect (as) many data points on users (as possible)
* Tracking, data aggregation, etc.
* Social media services
* Integration of services, e.g. as described in the video “How China is changing your Internet”
But we do have a few tools to protect data privacy:
* Technical measures, e.g. cryptography, The Onion Router (TOR)
* Legal measures, e.g. data privacy legislation
What is Cryptography?
Cryptopgraphy is the process/art of writing code that keeps
information encrypted.
What is Symmetric Encryption?
Symmetric: Conventional mode of encryption – uses the same key to encode and decode information
What is Asymmetric Encryption?
Asymmetric: Newer and more complex mode of encryption. - utilizes two keys to unlock encrypted information. This is a public and a private key.
* Public key is for use of the public.
* Private key is held for the owner’s use to protect information.
Anonymity on the Internet (I have no clue how to pose this one as a question)
Anonymity in the Internet is hard to achieve, but there are some tools available that are helpful, e.g.
The Onion Router Project (TOR)
* Used to surf in the Internet while hiding your IP address, e.g. with the customized TOR browser
* Sends internet traffic through a series of relays (randomly selected out of thousands of relays worldwide)
* Uses multiple layers of encryption (=> onion analogy)
* No single entity knows the whole route (no one can follow you)
What is E2EE?
End-to-End Encryption (E2EE)
Secure line of communication/data transfer. The secure line blocks 3rd -party users from access.
Only sender and receiver can decrypt the communication with a key.
Mitigates risk and protects data / information transfer from source to source.
Secure Communication with Cryptography
How can we ensure that nobody can intercept and read a message except the intended recipient?
Solution: encrypt it with a secret key before sending it.
Message is then decrypted at the receiver’s end.
What is Secret Key Cryptography?
Encryption and decryption use the same key: symmetric key encryption
Problem: all parties (sometimes more than 2) must exchange a secret key before they can start to communicate
A common standard for secret key cryptography is AES (Advanced Encryption Standard) => it is used for HTTPS
Longer keys are more secure
What is a Secret or Private Key?
Symmetric: a secret key is a framework to decrypt and encrypt messages.
Each party (sender/receiver) possess a common secret key.
* Message is transformed from plaintext to ciphertext and the receiving party reverses the process to reveal the information. Process repeats.
What is the Caesar’s Cipher Encryption Technique?
Uses a very simple encryption rule:
* Each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet, e.g., shift of 23 positions
This encryption can easily be broken by letter frequency analysis
What are some Cryptography Concerns with security by obscurity?
An approach that is NOT recommended: security by obscurity
* Assuming others will never learn how the system works
* History proves: this fails eventually as details of the system come to light
Better approach: assume everybody knows how the cryptographic system works (experts can probe it) and use it with a secret key
What can compromise a Secret Key?
Communication is secret unless the key is compromised.
Compromises:
* Revealing it by theft, bribery, carelessness of users, etc.
* Breaking it with cryptographic attacks
Breaking a key is only a matter of time and computational power
=> no key is 100 % secure
What is Public Key Cryptography?
Instead of one shared secret key, each party participating in a conversation creates a pair of two matching keys:
* Private key: only the creator knows it (and it must be kept secret)
* Public key: everybody may know it (and it is publicly available)
Any message encrypted by one key can be decrypted by the other key (no matter which one, it works in both directions)
This is also called asymmetric cryptography
Most common public key cryptography system is RSA (used for HTTPS)