Non-repudiation Flashcards

1
Q

Non-repudiation

A

You can’t deny what you’ve said
-There’s no taking it back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sign a contract

A

-your signature adds non-repudiation
-you really did sign the contract
-others can see your signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Adds a different perspective for cryptography

A

-proof of integrity
-proof of origin, with high assurance of authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Proof of integrity

A

-verify data does not change
-the data remains accurate and consistent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In cryptography, we use a hash

A

-represent data as a short string of text
-a message digest, a fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If the data changes, the hash changes

A

-if the person changes, you get a different fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Doesn’t necessarily associate data with an individual

A

-only tells you if the data has changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If the hash is different, something has changed

A

-the data integrity has been compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Prove the source of the message

A

-authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Proof of origin

A

-prove the message was not changed
-integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Make sure the signature isn’t fake

A

-non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sign with the private key

A

-the message doesn’t need to be encrypted
-nobody else can sign this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Verify the public key

A

-any change to the message will invalidate the signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Creating a digital signature

A

-alice is sending a message to bob that says your hired bob, she will provide a digital signature before she sends it - the first thing that happens when she clicks that checkbox for the digital signature is that a hashing algorithm creates a hash of the plain text. Once the hash is created we now need to have some way to verify that it came from alice, and since alice is the only one with her private key, we are going to encrypt that hash with alice’s private key, take that encrypted hash , send it along with the plain text so that bob is going to receive a message that says you’re hired bob and then attached to that message is a digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Verifying a digital signature

A

-bob is going to use alice’s public key which is a key available to anyone and he is going to exam the digital signature and decrypt it using that public key. Once that decryption takes place we have the original hash that was created of that plain text message. Bob now wants to see if the hash that was in that digital signature matches the hash of what he received. He is going to take the original plain text, run it through the same hashing algorithm to come with a hash of what he received. He can now compare the hash and if that matches he knows the info is exactly what was sent and it was sent from alice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly