Cryptography, hashing and protection Flashcards
Encryption
Encryption uses an algorithm to scramble, or encrypt, data and then uses a key for the receiving party to unscramble, or decrypt,
the data.
Plaintext
Data in its readable form
ciphertext
data in its unreadable, encrypted form
Encryption vs hashing
- Hashing of passwords is one way function (convert plaintext to ciphertext but NOT back again)
- Encryption is a two-way function (convert plaintext to ciphertext and back again)
- Hashing is preferred as the ability to decrypt passwords provides a security risk.
Cryptography definition
The study of securing data from outside observers
Encryption definition
The act of scrambling readable data into unreadable ciphertext
Decryption definition
The act of unscrambling ciphertext into readable data
Algorithm
The set of steps that the encryption and decryption process follows
Encryption keys
Key: a random string of bits created specifically for encrypting and/or decrypting data.
Symmetric-key encryption:
* Encryption and decryption uses the same key.
* The key must be kept secret.
Asymmetric-key encryption:
* Encryption and decryption use different keys
* Keys are mathematically relatedbut it is computationally not feasible to find one from another.
* Encryption key can be made public.
* Decryption key must be kept secret.
Confidentiality
- Keeps information away from unauthorised persons
- One way of achieving this is by using mathematical algos for data encryption
Integrity
- Data may get modified intentionally or accidentally
- This makes sure that the data is still intact since it was last transmitted or stored
- It allows you to see whether the modification of data was necessary or not
Non - repudiation
*Is a security service that ensures that an entity cannot refuse the ownership of a previous commitment or an action.
- It is assurance that the original creator of the data cannot deny the creation or transmission of the data to a third party
Authentication
- Provides identification of originator
- It confirms to the receiver that the data received has been sent only by an identified/ verified sender
2 types of authentication
Message authentication - Identifies the originator of the message without any regard of who has sent the messages
Entity authentication - assurance that the data has been recieved from a specific entity
Salting
*A salt is a unique, randomly generated string that is added to each password as part of the hashing process.
*As the salt is unique for every user, an attacker has to crack hashes one at a time using the respective salt,
rather than being able to calculate a hash once and compare it against every stored hash.