Chapter 17: Security Flashcards

1
Q

Explain Key Cryptography

A
  • Ensures a message is authentic/ from a trusted source
  • Ensure message has not been altered during transmission
  • Makes sure only the intended receiver is able to understand a message
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric Encryption - Explain (4 - 5 marks)

A
  • Provides better security by using a pair of different key
  • One of the keys is used to encrypt the message, the matching one is used to decrypt it
  • Only the public key is available to everyone, private key is kept secret (hence the name)
  • Is a longer process, as it is more complex
  • Length of key is longer -> Usually 2048
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Process of communication using Asymmetric Encryption

A
  • The receiver’s computer uses an algorithm to generate a matching pair of keys
  • The public key is sent to the sender’s computer
  • ## The sender encrypts the document/ file/ data using the key to create cipher text
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How will the sender/ receiver realise that their massage has been altered? (4 marks)

A
  • The message and the digital signature is decrypted using the receiver’s private key
  • The digital signature received is decrypted with the sender’s public key to recover the digest sent
  • The decrypted message received is hashed with the agreed hashing algorithm to reproduce the message received
  • The two digests (received ad reproduced) are compared
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Symmetric Encryption

A

Symmetric Encryption
- Uses a single key which is used/ shared by all to encrypt and decrypt messages
- Simple process that can be carried out quickly, higher risk of compromise
- Shorter key length when compared to asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Quantum Cryptography

A
  • Encryption that uses photons and filters
  • Protects security of data transmitted over fibre optic cable
  • Virtually unhackable encryption system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

2 Advantages and Disadvantages of Quantum Cryptography

A

Advantages
- Detects any Eavesdropping from the change of photons
- Once transferred, the integrity of the key can be guaranteed: It cannot be copied nor decrypted later
- More secure, longer keys are used

Disadvantages
- Expensive
- Limited Range
- Polarization of light may be altered during the transmission through the fibre optic cable
- Its new: Still lack vital features and has high error rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Private Key

A
  • As the name suggests, its a secret key that is never transmitted
  • It has a matching public key
    Is used to decrypt date that was encrypted with its matching public key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSL/ TLS use when Client - Server Communication is Initiated

A

SSL/ TLS Connection is initiated by an application which becomes the client
- Application which receives the connection becomes the server

Every new session begins with a handshake
- A digital certificate is requested from the client
- The requested certificate is then sent by the server
- The client verifies the server’s digital certificate and obtain the server’s public key
- Encryption algorithm are agreed upon by the client and server

Key pair is generated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly