Security Flashcards
Purpose of Assymetric encryption
To provide better security using a public key and a private key. The message is encrypted using one of the keys then the message is decrypted using the matching key.
Benefits of Quantum Cryptography (min 2 - max6)
-Longer keys can be used.(i)
-Detects eavesdropping(i)
-Provides security based on laws of physics rather than mathematical algorithms, so it is more secure.
-To protect the security of data transmitted over fibre optic cables.
-Virtually unhackable.
-The performance of quantum cryptography is continuously improved, making it suitable for most valuable government/industrial secrets.
Drawbacks Quantum Cryptography(min 2 max 6)
-High cost of purchasing(i)
-Error rates are high as technology is still under development.(i)
-Only works over relatively short distances.
-Can help terrorists an criminals hide their communications.
-Lacks many vital features such as digital signature, certified mail etc.
-Polarisation of light can change during transmission.
Why is encryption used?
-To ensure the message is authentic // came from a trusted source.
-To ensure that only the intended receiver is able to understand the message
- To ensure the message has not been altered during transmission.
-Non-repudiation, neither the sender or receiver can deny the transmission occurred
What is a public key?
-An encryption method produced by a trusted authority that can be used by anyone.
-Key widely available that can be used to encrypt messages that only the owner of a private key can decrypt.
-Can be used to decrypt a digital signature, thereby confirming the originator of the message.
What is a private key?
-Is a key that is not transmitted anywhere.
-It has a matching public key.
-It is used to decrypt the data that has been encrypted with its matching public key.
What is assymetric key cryptography?
-Uses a matching pair of keys.
-The message to be sent is encrypted using the recipient’s public key. // The message to be sent is encrypted using the sender’s private key.
-The message is decrypted using the recipient’s private key. // The message is decrypted using the sender’s public key.
Benefits of assymetric encryption.
-Increased message security as one key is private.
-Allow message authentication.
-Allos non-repudiation.
-Detects tampering.
What is symmetric encryption and what are some of its drawbacks?
-A single key is used for both encryptin and decryption.
–Key has to be exchanged securely.
-Once compromised, the key can be used to decrypt both sent and received messages.
-Cannot ensure non-repudiation
Differences between symmetric and asymmetric encryption.
-Symmetric cryptography uses a single key to encrypt and decrypt messages, Asymmetric cryptography uses two
-The symmetric key is shared, whereas with asymmetric, only the public key is shared (and the private key isn’t).
… the risk of compromise is higher with symmetric encryption and asymmetric encryption is more secure.
-Symmetric cryptography is a simple process that can be carried out quickly, but asymmetric is much more complex, so slower.
-The length of the keys in symmetric encryption are (usually) shorter than those for asymmetric (128/256 bits v 2048 bits)
Purpose of quantum cryptography
-To produce a virtually unbreakable encryption system / send virtually unhackable secure messages…
-…using the laws / principles of quantum mechanics / properties of photons.
-Detects eavesdropping…
…because the properties of photons change.
-To protect the security of data transmitted over fibre optic cables.
-To enable the use of longer keys.
what is the purpose of SSL and TLS?
-The SSL and TLS protocols provide communications security over the internet / network
… they provide encryption
-They enable two parties to identify and authenticate each other
… and communicate with confidentiality and integrity.
Give three situations where SSL/TLS would be appropiate.
-banking
-online shopping
-private / secure email
-financial transactions
-secure file transfer
-instant messaging
-Using VPNs
-Using cloud storage facilities.
What are three differences between SSL and TLS?
-It is possible to extend TLS by adding new authentication methods.
-TLS can make use of session ching which improves the overall performance of the computer compared to using SSL.
-TLS separate the handshaking process from the record protocol layer.
WHat does secure socket layer do?
-Encrypts the data when the user logs onto a website.
…Only the client’s computer and the web server are able to make sense of what is being transmitted.
-Data compression
-Data integrity checks