Cryptography and Privacy (Week 14) Flashcards

1
Q

What is Computer Security?

A

Computer Security means protection of computer systems from…
* Theft or damage of hardware, software and data
* Disruption or misdirection of services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the challenge of Data Privacy?

A

The challenge of Data Privacy is to…
* use data while
* protecting an individual’s privacy preferences and their personally identifiable information (PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to Protect Data Privacy?

A

Most systems and services are designed to collect (as) many data points on users (as possible)
* Tracking, data aggregation, etc.
* Social media services
* Integration of services, e.g. as described in the video “How China is changing your Internet”

But we do have a few tools to protect data privacy:
* Technical measures, e.g. cryptography, The Onion Router (TOR)
* Legal measures, e.g. data privacy legislation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Cryptography?

A

Cryptopgraphy is the process/art of writing code that keeps
information encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Symmetric Encryption?

A

Symmetric: Conventional mode of encryption – uses the same key to encode and decode information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Asymmetric Encryption?

A

Asymmetric: Newer and more complex mode of encryption. - utilizes two keys to unlock encrypted information. This is a public and a private key.
* Public key is for use of the public.
* Private key is held for the owner’s use to protect information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Anonymity on the Internet (I have no clue how to pose this one as a question)

A

Anonymity in the Internet is hard to achieve, but there are some tools available that are helpful, e.g.

The Onion Router Project (TOR)
* Used to surf in the Internet while hiding your IP address, e.g. with the customized TOR browser
* Sends internet traffic through a series of relays (randomly selected out of thousands of relays worldwide)
* Uses multiple layers of encryption (=> onion analogy)
* No single entity knows the whole route (no one can follow you)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is E2EE?

A

End-to-End Encryption (E2EE)

Secure line of communication/data transfer. The secure line blocks 3rd -party users from access.

Only sender and receiver can decrypt the communication with a key.

Mitigates risk and protects data / information transfer from source to source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Secure Communication with Cryptography

How can we ensure that nobody can intercept and read a message except the intended recipient?

A

Solution: encrypt it with a secret key before sending it.

Message is then decrypted at the receiver’s end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Secret Key Cryptography?

A

Encryption and decryption use the same key: symmetric key encryption

Problem: all parties (sometimes more than 2) must exchange a secret key before they can start to communicate

A common standard for secret key cryptography is AES (Advanced Encryption Standard) => it is used for HTTPS

Longer keys are more secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Secret or Private Key?

A

Symmetric: a secret key is a framework to decrypt and encrypt messages.

Each party (sender/receiver) possess a common secret key.
* Message is transformed from plaintext to ciphertext and the receiving party reverses the process to reveal the information. Process repeats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Caesar’s Cipher Encryption Technique?

A

Uses a very simple encryption rule:
* Each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet, e.g., shift of 23 positions

This encryption can easily be broken by letter frequency analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some Cryptography Concerns with security by obscurity?

A

An approach that is NOT recommended: security by obscurity
* Assuming others will never learn how the system works
* History proves: this fails eventually as details of the system come to light

Better approach: assume everybody knows how the cryptographic system works (experts can probe it) and use it with a secret key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can compromise a Secret Key?

A

Communication is secret unless the key is compromised.

Compromises:
* Revealing it by theft, bribery, carelessness of users, etc.
* Breaking it with cryptographic attacks

Breaking a key is only a matter of time and computational power
=> no key is 100 % secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Public Key Cryptography?

A

Instead of one shared secret key, each party participating in a conversation creates a pair of two matching keys:
* Private key: only the creator knows it (and it must be kept secret)
* Public key: everybody may know it (and it is publicly available)

Any message encrypted by one key can be decrypted by the other key (no matter which one, it works in both directions)

This is also called asymmetric cryptography

Most common public key cryptography system is RSA (used for HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an example of how Public Key Encryption could be used to send a secret message?

A

Common example for using public key encryption: Bob sends a secret message to Alice which only she can read:

Bob encrypts the message with Alice ́s public key, sends it over the network and Alice decrypts it with her private key

17
Q

How can Public Key Encryption be used to verify the sender of a message?

A

Another example for using public key encryption: to verify the sender of a message. It works like this:

  1. Bob encrypts a message with his private key and sends it over to Alice
  2. Alice decrypts the message with Bob’s public key – the message must be from Bob, because only Bob knows his private key.
  • Please note that everyone else can decrypt the message as well => the message content is not secret
  • How can we be sure that Bob ́s public key is not fake? => We need two more tools for that: hashes and certificates
18
Q

What is a Cryptographic Hash?

A

A cryptographic hash is a “fingerprint” of a message, a.k.a. message digest

A hash function scrambles the bits of an input of any length (message or file) into a fixed-length hash, e.g., a sequence of 128 bits

The hash identifies a message or file like a fingerprint identifies a person

19
Q

What is the purpose of a Cryptographic Hash? Why would we use it?

A

To find out whether a message (or a document) was altered => a tiny change in the message completely changes the hash

20
Q

How can we identify changes to a document using a Cryptographic Hash?

A

We can recompute the hash and watch out for changes

It is (computationally) very challenging to reverse the hash
calculation => to create a fake message that matches a given hash.

21
Q

What does a Digital Signature do?

A

Application of Hashes: Digital Signatures

A digital signature verifies that
(1) document was not changed in transit and
(2) was authorized by the signer

Example of a Digital Signature

Acrobat Reader can show who signed the document and verify that the signature is valid => the document was not altered

22
Q

What is a Digital Signature used for?

A

A digital signature is used to verify the authenticity of digital messages or documents. It proves that…
* the document was created/approved by the signing entity
* the document was not altered (e.g. in transit)

23
Q

How can we be sure that a
public key used for a signature is not fake?

A

Problem: how can we be confident that a public key really belongs to a certain person or institution

Solution: use digital certificates to prove the ownership of public keys

Important components of a certificate
* Public key of the user
* Name/Domain of the user
* Expiration date
* Digital signature of the certification issuer (usually a well established certification authority)

The issuer ́s signature verifies the public key and the subject ́s name stated in the certificate

24
Q

How are Digital Certificates used in HTTPS?

A

1) Client requests HTTPS session

2) Certificate sent back ( with Public Key)

3) Client creates random session key

4) Session key encrypted with public key
At this point, only client knows session key

5) Encrypted session key sent to server

6) Session key decrypted with private key
At this point, both client and server know session key

7) Session encrypted with symmetric session key

25
Q

How is Public Key Cryptography used for Key Exchange?

A

Public key cryptography is mathematically more challenging than secret key cryptography
* it needs more computing power => it is slower
* Simpler devices, e.g. chips on credit cards, may have trouble encrypting larger amounts of data

Hence: combine advantages of public & secret key encryption
1. Use asymmetric encryption (public key encryption) to exchange a secret key between parties
2. Continue communication with faster symmetric encryption

26
Q

How can we trust the signature of a certificate?

A

The Certificate “Chain of Trust”

We look up the certificate of the issuer, and then the certificate of the issuer of that certificate and so on…

Every OS comes with a number of various root certificates installed.

27
Q

Cryptography for Secure Storage

How to encrypt local files or complete disks?

A

Some systems come with hardware encryption for drives, e.g. most Solid State Drives (SSL) provide built in encryption

28
Q

Cryptography for Secure Storage

Software for encryption of cloud storage?

A

Boxcryptor
* Commercial, encrypts files on your Dropbox, Google Drive, OneDrive…

EncFS MP
* Open Source, similar features but less convenient to use than Boxcryptor

29
Q

Cryptography - Summary

What is Symmetric Cryptography?

A

Symmetric cryptography uses a previously exchanged secret key to encrypt and decrypt messages

30
Q

Cryptography - Summary

What is Asymmetric Cryptography?

A

Asymmetric cryptography uses a pair of keys (public and private key) to encrypt and decrypt messages

31
Q

Cryptography - Summary

What is a Cryptographic Hash (or message digest)?

A

A cryptographic hash (or message digest) is a fingerprint of a message used to prove that the message was not altered

32
Q

Cryptography - Summary

What is a Digital Signature?

A

A digital signature verifies the originator of a document and that it was not altered. Typically, signed documents are not encrypted.

33
Q

Cryptography - Summary

What is a Digital Certificate?

A

A digital certificate proves that a certain public key belongs to a person, institution or domain