Security Questions Flashcards

1
Q

Define Encryption.

A

The process of turning plain text into cypher text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain the term Public Key

A

Key widely available that is used to encrypt messages, which only the owner of the Private key can decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain the term Private key.

A

Key needed to decrypt data that was encrypted by a public key,
It is used in Asymmetric encryption and is not shared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the similarities and differences between Private key and Public key?

A

Similarities:
1)Both used in asymmetric encryption
as a pair of keys are required, one is used to encrypt data and the other is used to decrypt the data.
Differences:
1)Private key is only known to the owner of the key pair while Public key is widely distributed.
2)When messages are sent to the owner of public key, they are encrypted by the owners public key, So they can only be decrypted by the owners private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain how Public and Private keys are used to ensure that only a particular person recievces the email.

A

Senders computer will encrypt the email using recievers public key before sending.
Reciever will decrypt the data using their private key.
As the Private key is only known to the reciever, only she can understand it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a protocol?

A

A set of rules which governs how two devices communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe what happens when setting up a secure connection using SSL.

A

1)Client requests that server identifies itself.
2)Server sends a copy of its digital certificate along with its Public key.
3)Client checks the certificate against a list of trusted Certificate Authorities.
4)If the client trusts the certificate, it creates, encrypts and sends the server a symmetric session key using the server’s public key.
5)Server decrypts the the symmetric session key using its private key.
6)Server sends the browser an acknowledgement, encrypted with the session key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

State and explain the two layers of Transport Layer Security (TLS).

A

Record Layer: Can be used with or without encryption, it contains the data being transmitted over the network.
Handshake Protocol: Permits the server and client to authenticate each other and to make use of encryption algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the difference between SSL and TLS?

A

1) It is possible to extend TSL by adding new authentication methods unlike SSL.
2)TLS makes use of session caching which improves the overall performance of the communication.
3)TLS seperates the handshaking protocol from the Record protocol where the data is held.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of TLS?

A

1)Its purpose is to provide a secure communication over a netwrok, it maintains data integrity and has a additional layer of security.
2)It provides improved security over SSL.
3)It is composed of two layers Handshake and Record protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the applicaitons of TLS ?

A

Online Banking
Private Email
Online Shopping
Secure file transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the problems that SSL and TLS overcome?

A

Security
Privacy
Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What security parameters are agreed between server and client during hand shake?

A

1)Which Protocol will be used (As there are different versions of the two protocols)
2)Session Type (Reusable or Not)
3)Encryption Method ( Asymmetric or Symmetric)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain how asymmetric encryption uses the contents of the digital certificates to ensure that the message has not been altered during transmission.

A

1)Senders message is encrypted with recievers public key provided by recievers digital certificate.
2)Agreed Hashing algorithm mentioned in the digital certificate is used on the message to produce message digest
3)The message digest is encrypted with senders private key to produce digital signature
4)Both digital signature and encrypted message is sent
4)The message is decrypted recievers private key
5)Senders digital signature is decrypted with sendes public key to obtain the message digest.
6) Reciever recreates the message digest using the same hashing algorithm
7)If both copies of message digest matchup then data has not been altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain how Asymmetric encryption is used to ensure it is a verified message. [3]

A

The sender creates the message digest.
Reciever recreates the message digest
If both copies of message digest match then data has not been altered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is a digital signature produced?

A

1)A message is put on a agreed hashing algorithm to produce a message digest
2)The message digest is encrypted with senders private key
This is how digital signature is produced

17
Q

How is a digital certificate obtained?

A

Organization applied to an issuing Certificate Authority (CA) with some proof of identity.
For example: name and address of organization.
So their identity can be checked by an organizational registration authority.
So that a digital certificate will only be issued to a trusted organization

18
Q

What are the items present in a digital Certificate?

A

1)Public Key (To encrypt data)
2) Agreed Hashing ALgorithm (To produce message digest)
3)Name of organization
4)Serial Number
5)Date Valid to

19
Q

What is the purpose of Quantum Cryptography?

A

Its purpose is to provide method of secure communication that uses principles of physics to ensure data cannot be read by hackers without detection.

20
Q

What are the benifits of using Quantum Cryptography?

A

Any eavesdroping can be identified
Integrity of the key once transfered, can be guranteed.
More secure keys can be exchanged.

21
Q

What are the drawbacks of using Quantum Cryptography?

A

1)It requires dedicated line and specialized hardware, which can be expensive to implement.
2)It still has limited range.
3)It is possible for the polarization of light to be altered due to various conditions while travelling down fibre optic cable.
4)Terrorists can use this technology to hide their activities from the Goverment.

22
Q

What is the purpose of digital signature?

A

To ensure document is Authentic ( came from a trusted source)
To ensure document has not been altered
Non repudiation