4.9.3 The Internet Flashcards

1
Q

What is encryption?

A

The process of scrambling data so that it cannot be understood if intercepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What occurs in symmetric encryption?

A
  • The sender and receiver share the same private key.

* This key is used to both encrypt and decrypt data sent between the two parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What occurs before data transmission in symmetric encryption?

A

• The sender and receiver must participate in a key exchange to ensure that they both have a copy of their shared key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a flaw in symmetric encryption?

A

• If the key is shared over a network, the key is vulnerable to interception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is asymmetric encryption?

A
  • When two devices communicate using asymmetric encryption, four different keys are used.
  • Each device has a pair of mathematically related keys, one of which is kept secret ( private key ) and the other shared on the internet ( public key )
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens when a message is encrypted with a public key?

A

Only the corresponding private key can decrypt it and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens in asymmetric encryption before a message is sent?

A
  • Before a message is sent it is encrypted by the sender using the recipient’s public key.
  • This means that the message can only be decrypted by the corresponding private key: the recipient’s private key which only the recipient has access to.
  • This means the recipient is the only one who can decrypt the message.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of digital signatures?

A

A digital signature can be used to verify the sender of a message and to verify that the message has not been tampered with during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is the digest created?

A

The digest of a message is created by a hashing or checksum algorithm.
The value of the digest depends on the contents of the message and will not be the same if the message is changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the value of the digest dependent on?

A

The contents of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is the digest encrypted?

A

The digest is encrypted with the sender’s private key which anyone can decrypt using the sender’s public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How are the message and appended digest encrypted?

A

With the recipient’s public key, meaning only the recipient can decrypt the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens when the recipient receives the message via asymmetric encryption?

A

They first decrypt it using their private key leaving them with the decrypted message and an encrypted digest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens when the recipient decrypts the message using their private key?

A

leaves them with:
• Decrypted message
• Encrypted Digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is the message verified as having been sent by the sender?

A

• As the digest is encrypted using the sender’s private key.
• It can only be decrypted using the sender’s public key.
This verifies that the message was really sent by the sender as only they have access to their private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is it checked that the message was not tampered with?

A
  • The recipient carries out the same hashing or checksum algorithm on the message and checks whether their results matches the now decrypted digest.
  • If everything matches the recipient can be certain that the message was sent by the sender and hasn’t been tampered with or corrupted during transmission.
17
Q

What are the stages to asymmetric encryption?

A
  1. A digest of the message is
    created, perhaps by a
    hashing or checksum
    algorithm. The value of the
    digest depends on the
    content of the message and
    will not be the same if the
    message is changed.
  2. This digest is encrypted with the sender’s private key
    (which anyone can decrypt with the sender’s public key)
  3. The encrypted digest is appended to the message
  4. The message and appended digest are encrypted
    with the recipient’s public key, meaning that only the
    recipient can decrypt the information.
18
Q

What is the purpose of a digital certificate?

A
  • A digital certificate verifies the ownership of a key pair used in asymmetric encryption.
  • Check that a fake key pair isn’t being used by an impostor.
19
Q

Who issues digital certificates?

A

Certificate authorities

20
Q

What do digital certificates contain?

A
  • Serial number
  • Owner’s name
  • Expiry date
  • Owner’s public key
  • Certificate Authority’s digital signature