csrm 2 Flashcards
Symmetric key cryptography
Simplest kind. It involves only one secret key to cipher and decipher information. Symmetric encryption uses a secret key that can either be a number, a word, or a string of random letters. Key K is used for both encryption and decryption.
Asymmetric encryption
Public key cryptography. It uses two keys to encrypt a plain text. Secret keys are exchanged over the Internet or a large network. It ensures that malicious persons do not misuse the keys.
Public key cryptography (single pair)
It uses a pair of two related keys for encryption and decryption. The public key (PK) is published and distributed (linked to its owner), and the secret key (SK) is private and unique. It does not matter if someone intercepts PKb, this one is public
Public key cryptography (double pair):
Use PKb to encrypt and SKb to decrypt. Or use Ska to encrypt (signature) and anyone with PKa can test.
application of encryption/decryption
- Signature: Purpose is to authenticate a message. A signature schema has a key-pair generation function which given a random input R will return to keys (private signing key and public verification key).
- Governance of public key infrastructure (PKI): Infrastructure and governance mechanisms for establishing a secure key exchange. Procedures for linking keys (certificates) to a natural person. The weaknesses are often in key management and governance structure.
- Protocols: Rules for interaction (TCP/IP protocols).
- Two-factor authentication
- Mathematical security models
- SP networks (substitution – permutation)
- Advanced encryption standard
- Feistel cipher
- DES (3DES)
Types of encryptions
Biometric encryption technologies:
End-to-end encryption
Quantum cryptography
Homomorphic encryption:
Blockchain
Biometric encryption technologies
Fingerprints, facial recognition, and voice recognition. This type of technology will remove the need for remembering annoying passwords and answers to secret questions. You also can’t lose this biometric aspect. You’re face or fingerprint will be representing by a number by measuring distance between aspects. A range of correct inputs will be accepted.
End-to-end encryption
A system of communication where only the communicating users can read the messages. It prevents potential eavesdroppers from being able to access the cryptographic keys needed to decrypt the conversation. Each phone has two unique keys that encrypt and decrypt messages (public and private keys). A combination of public and private keys is used to create a temporarily shared key. The public keys are used to confirm that the shared key is authentic. The shared keys are erased and regenerated constantly; this ensures that the conversations can’t be eavesdropped in the future.
Quantum cryptography:
makes encryption useless because a quantum computer would be able to easily decrypt anything that is encrypted. The way to combat this would be via quantum cryptography. It relies on the law of physics. The key is a stream of photons. These photons have a property called spin which can be changed when it passes. It reflects in filters to 0 and 1’s.
Homomorphic encryption
Used for transmission of highly classified material while keeping the material highly secured. There will be worked on the data inside of a protected box without having full access. Processed without access.
Blockchain
Decentralized ledgers lead to encryption technology. Only some people have a copy.
Ethics and data protection: privacy
The right for information self-determination. Also, right to ‘control, edit, manage, and delete information about themselves and decide when, how and to what extent information is communicated to others.’
General Data Protection Regulation:
Talks about privacy law (right to privacy and a private life) and Data protection law. It is an EU regulation (2016) on the protection of natural persons about the processing of personal data and on the free movement of such data. It governs how, when, and why data controllers and processors process personal data. Some differences with previous regulations:
what is the difference between privacy and confidentiality
Confidentiality is a part of privacy. Privacy is a bit broader, also talks about granularity of information, types of processing, consent, opt-out v. opt-in.
General Data Protection Regulation. What are Some differences with previous regulations:
- Increased sanctions and authority for regulators, increased accountability for organizations
- Introduces obligations to perform Data protection impact assessments and to appoint data
protection officer and to report breaches - Strengthen the idea of privacy by design and privacy by default
- Uphold right to be forgotten
- Strengthen rules against profiling