Encryption and Secure Exchanges Flashcards

1
Q

What is encryption?

A

A form that must be decoded to be read. The process of reversing this is called decryption.

Why do we do this? We don’t want hackers to be able to understand our data if it is hacked into.

Encryption is not perfect, but necessary- Takes the data and puts it into a different form.

It requires a key or input parameter. The longer the key the slower it is going to run but harder to crack.

The algorithm to make information unreadable with key facilitates privacy and unwanted access and facilitate authentication.

Single-key encryption uses one algorithm to encrypt and decrypt

Symmetric Encryption (1 key)- Fast, simple, and easy. most common. If sending, it is less effective and not used often.

Asymmetric Encryption (2 keys)- One key to encrypt, one public decrypts. If public encrypts, price decrypts. If private encrypts, public decrypts. It is safe but more complicated (slower).

Limits and future of encryption- must be apart of a comprehensive strategy.

  • Need access controls and authentication techniques.
  • It is arms raise with hackers. Hackers are working to break encryption.
  • “honey” encryption- may guess about encryption key yield falsified data that correct
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a digital certificate?

A

Electronic document that contains information

Purpose: Provide identify. and create secure communication

Legally recognized identification (uses public/private key technology)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a certificate of authority?

A

Use asymmetric keys and a key pair.

Registers public key on server and send private key to user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are digital signatures?

A

use/private key pair to authenticate user

Weakness: public/private key pair can be acquired without verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SSL, S-HTTP, and SET

A

SSL (secure socket layer)
- Use encryption

S-HTTP (Secure hypertext Transport Protocol)
- use encytprion

SET (Secure Electronic Transactions)
- Used for consumer purchases

All relate to encryption and asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly