Encryption and Secure Exchanges Flashcards
What is encryption?
A form that must be decoded to be read. The process of reversing this is called decryption.
Why do we do this? We don’t want hackers to be able to understand our data if it is hacked into.
Encryption is not perfect, but necessary- Takes the data and puts it into a different form.
It requires a key or input parameter. The longer the key the slower it is going to run but harder to crack.
The algorithm to make information unreadable with key facilitates privacy and unwanted access and facilitate authentication.
Single-key encryption uses one algorithm to encrypt and decrypt
Symmetric Encryption (1 key)- Fast, simple, and easy. most common. If sending, it is less effective and not used often.
Asymmetric Encryption (2 keys)- One key to encrypt, one public decrypts. If public encrypts, price decrypts. If private encrypts, public decrypts. It is safe but more complicated (slower).
Limits and future of encryption- must be apart of a comprehensive strategy.
- Need access controls and authentication techniques.
- It is arms raise with hackers. Hackers are working to break encryption.
- “honey” encryption- may guess about encryption key yield falsified data that correct
What is a digital certificate?
Electronic document that contains information
Purpose: Provide identify. and create secure communication
Legally recognized identification (uses public/private key technology)
What is a certificate of authority?
Use asymmetric keys and a key pair.
Registers public key on server and send private key to user.
What are digital signatures?
use/private key pair to authenticate user
Weakness: public/private key pair can be acquired without verification
What is SSL, S-HTTP, and SET
SSL (secure socket layer)
- Use encryption
S-HTTP (Secure hypertext Transport Protocol)
- use encytprion
SET (Secure Electronic Transactions)
- Used for consumer purchases
All relate to encryption and asymmetric encryption