Module 11 Flashcards

1
Q

Encryption

A

-send a postcard of info through internet to get to destination but WHAT IF THERE IS AN EVIL DOER?

-it intercepts the information and can copy it and send it somewhere else as it is heading to its destination, so it will now have a copy of it

-to prevent this we ENCRYPT OUR MESSAGES

so the sender encrypts the message, and sends the encrypted message to the reciever, and now the evil doer cannot intercept because ti cannot/ does not have the instructions to decrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

One technique to encrypt messages

A

+3 Caesar Cypher
-move the letters forward 3 in the encrypted message]
ie
original is abc
encrypted is def

the reciever needs to know the instructions (the number) so that they can decrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Modern Encryption

A

use huge numbres to enceupt our messages, not just +3 like the ceasear cypher

AS LONG AS SENDER AND RECEIVER HAVE THE instrcutions to DECRYPT it will work smoothly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why will we not have complete privacy

A

because of packets
-first contact we have to send info on internet is packets
-since we are sending the password too, we will never have COMPLETE privacy
0cant change it completely in secret unless we have KEY EXCHANGE!!!!!!!!!!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

One way function

A

-easy to do in one direction but hard to do in the other

ex: have two prime numbers multiplied to equal a number, we know the final number and need to figure out what the og prime numbers were
ie (x)(y)=14
2*7

this is easy for computer but if its a really big number, the computer will take a little while to figure it out

another example:
MODULO REMAINDER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Modulo REmainder/ key exchange technique

A

example of one way function and a way to encrypt

1337/10=133 +7 (remainder)

written as 1337mod10=7

or 3^x mod17=2
this is hard for computer to do

use this to encrypt

the password will be something like 3^xmod17
-everyone will know this
even the evil doer

Sender picks a number and reciever picks a number and only we will know these numbers
-we calculate the mod equation with our chosen numbers and we will send eachother the remainder answer that everyone will know

but now we get those numbers and raise that to the number that we originally picked that no one knows, and we will get the same number as partner, look at ipad
no one can determine this other number adn that is the number we will use to encrypt message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Assymmetric keys

A

-another way to communicate on internet
-assymetric key is a two key system

IMAGINE A LOCK
-blue key turns it clockwise (public key)
-red key turns it counterclockwise (private key)

Public (blue key) can only lock information, cant unlock it unless u have a red key. SO ONE WAY FUNCTION FOR BLUE KEY

this allows thousands of blue keys to be sent out that can lock it but only one red key that u have can unlock it

this works for sending messages because all three ofus ( evil doer, sender adn reciever have blue key), but only i have red key, so the other person can send me a locked message (locked with blue key) and only i can open it up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to verify a person with assymetric keys

A

If only i have a red key and i lock it, anyone can open it witha blue key, but the fact that i locked it with a red key and only i have that red key shows that it was me

-but someone can just say that it was them so we have someone else that we trust (a third party) that also verifies that this is actually the person (this communication is similar to other one way functions),

bascially we have people we trust adn if someone else vouches for them we will contiue to trust them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTTPS

A

Secure Hypertext Transfer Protocol

-a protocol that establishes rules for communicating in a secure way

-if i want to verify that it is a safe website, i send the server a message saying i can communicate with X, if they can too, they can send me a certificate and a public blue key, i will check certificate witha third party to makesure its real
-once i do this, i will share a private key with the server and now we can commuincate

-individual message can have a mini-certificate or a specific “timestamp” to ensure that it has not been forged further.

ie if we go to certain websites, there will be a lock that indicates that this is a secure and private discussion adn there will also even be a certificate that indicates that this is a trusted thing that a thrid party signed off to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly