Email Security Flashcards

1
Q

What are the steps for the sender to achieve authentication and digital signature security using PGP?

A
  1. Apply hash function to plaintext
  2. Encrypt the hash output using the private key of user A
  3. Append encrypted hash code with plaintext message
  4. Apply zip
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the steps for the receiver to achieve authentication and digital signature security using PGP?

A
  1. Unzip data to obtain message and encrypted hash code
  2. Decrypt encrypted hash code using public key of user A
  3. Apply hash code on message
  4. Compare between hashed message and decrypted hash code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the steps for the sender to achieve confidentiality using PGP?

A
  1. Apply zip to plaintext
  2. Apply symmetric encryption using secret key to zipped plaintext
  3. Encrypt the secret key using the public key of user A
  4. Append 2. with 3.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the steps for the receiver to achieve confidentiality using PGP?

A
  1. Decrypt secret key with private key of user A
  2. Using secret key, decrypt the encrypted zipped plaintext
  3. Unzip plaintext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is PGP originally incompatible with email protocols?

A

Encryption works with 8-bit octets but most emails use ASCII text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does Radix-64 fix compatibility problems with PGP?

A

Radix 64 encodes binary characters to ASCII characters. Every 24 bits (6+6+6+6) is 4 ASCII characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly