Security Part 1 Flashcards
What does encryption do?
renders a message unreadable so anyone seeing it won’t be able to determine the original message
What does decryption do?
retrieves the original message
What impacts the strength of an encryption?
the number of possible keys
What is the number of possible keys a function of?
The length of the key
What is symmetric key encryption?
the same key is used to encrypt and decrypt the message and both parties must know the key
What is the key distribution problem?
both parties must know the key
What type of encryption does the key distribution problem affect and what is the solution to the problem?
Affects symmetric key encryption
Solved by public key encryption
What is brute force search?
trying every possible key to find the actual key
What does it mean to be computationally secure?
an encryption method is computationally secure if it will take the a very long time to crack the message using the best tech
What is an implication of Moore’s Law in regard to encryption?
what is secure today may not be secure years from now
What is a hash function?
a computer function that maps input of any size onto an output of a fixed size
What is public key encryption?
The use of two keys, a public key, and a private key, that are mathematically related in order to encrypt a message
What does a digital signature do?
shows the message came from the sender (not an imposter) and has not been tampered with (has data integrity)
How does a digital signature work (4 characteristics)?
uses a hash function to convert the message, m, to a number, ℎ()
each letter is associated with a number and they’re added together mod1000
sender and receiver agree on a hash function
only the sender could encrypt, anyone can decrypt
What are the steps for a digital signature from the sending side?
- Calculate the hash function, h(m)
- Encrypt h(m) with the sender’s private key h(m)_c
- Send m and h(m)_c
What are the steps for a digital signature from the receiving side?
- Receive m and calculate the hash function of m, h(m)
2. Receive and decrypt h(m)_c using the sender’s public key and check to see if it equals h(m)
What do the symbols m, h(m) and h(m)_c signify in encryption?
m: plain text
h(m): hash of m
h(m)_c: cypher text
When using a digital signature, how do you know if the message came from the sender and has not been tampered with?
The message m came from the sender if when h(m)_c is decrypted, it equals h(m)
How do you find out the sender’s public key in a reliable way?
Through a certificate of authority
What do certificates have?
The digital signature of a known certificate authority
What is a certificate authority?
A small number of trusted organizations