Private and Public Keys Flashcards

1
Q

Define “Private Key Encryption”

A

Data encrypted by a single can that only the sender and receiver know.

This is called “Symmetrical Key Encryption”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define “Public Key Encryption”

A

The use of a Public key that is shared with many people, allowing them to access the documents that you encrypt using your private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does “Private Key Encryption” work??

A
  1. A Sender encrypts a message with one of the private keys.

2. The Receiver can then use a copy of that private key to decrypt the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does “Public Key Encryption” work??

A
  1. A Receiver can send out a public key that anyone can use to encrypt a message.
  2. Keeping the private key, the receiver can then decrypt the message using their key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can you add extra protection to a document, using the “Public Key Encryption”??

A
  1. A Sender can encrypt using their private key, and then do so again with the Receiver’s public key
  2. The Receiver can then decrypt the message and know what user has sent them the message, by using the appropriate Sender’s public key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define “Kerberos”

A

A way of data encryption that involves 3 Keys (3 headed Dog).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain how “Kerberos” works

A
  1. A User inputs their password to request access to a file(s).
  2. Once the user is verified, the Authentication Server sends a ticket (Ticket Granting Ticket) and a key.
  3. The TGT is encrypted, and given to the Ticker Granting Server for decryption using the key.
  4. The user is given an encrypted token and a key, and then the File Server is given the token, and the key, and it decrypts the token.
  5. The token is decrypted and the user is granted access to the File Server, but the token only allows access for a certain time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where do all the Keys come in with “Kerberos”??

A
  1. User and AS
  2. User and TGS
  3. User and File Server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly