Private and Public Keys Flashcards
Define “Private Key Encryption”
Data encrypted by a single can that only the sender and receiver know.
This is called “Symmetrical Key Encryption”
Define “Public Key Encryption”
The use of a Public key that is shared with many people, allowing them to access the documents that you encrypt using your private key.
How does “Private Key Encryption” work??
- A Sender encrypts a message with one of the private keys.
2. The Receiver can then use a copy of that private key to decrypt the message.
How does “Public Key Encryption” work??
- A Receiver can send out a public key that anyone can use to encrypt a message.
- Keeping the private key, the receiver can then decrypt the message using their key.
How can you add extra protection to a document, using the “Public Key Encryption”??
- A Sender can encrypt using their private key, and then do so again with the Receiver’s public key
- The Receiver can then decrypt the message and know what user has sent them the message, by using the appropriate Sender’s public key
Define “Kerberos”
A way of data encryption that involves 3 Keys (3 headed Dog).
Explain how “Kerberos” works
- A User inputs their password to request access to a file(s).
- Once the user is verified, the Authentication Server sends a ticket (Ticket Granting Ticket) and a key.
- The TGT is encrypted, and given to the Ticker Granting Server for decryption using the key.
- The user is given an encrypted token and a key, and then the File Server is given the token, and the key, and it decrypts the token.
- The token is decrypted and the user is granted access to the File Server, but the token only allows access for a certain time.
Where do all the Keys come in with “Kerberos”??
- User and AS
- User and TGS
- User and File Server