LECTURE NOTE 5 Flashcards
(38 cards)
the principle of digital signatures
- verifying the sender’s identity (authentication)
- ensuring the message’s integrity (integrity)
- preventing the sender from denying their involvement (non-repudiation)
These principles collectively contribute to secure and trustworthy
communication in digital transactions and exchanges
any action that compromises the security of information
security attack
mechanism that is designed to detect, prevent, or recover from a security attack. might operate by itself, or with others
security mechanisms
example of security mechanisms
Cryptography,
Message digests and digital signatures,
Digital certificates,
Public Key Infrastructure (PKI
Refer to the different services available for maintaining the security and
safety of an organization
secuirty services
name the four core security services
confidentiality
message/data integrity
message/data authentication
non-repudiation
confidentiality is provided by using primarily _____________ and less frequently ______________________
- symmetric siphers
- aymmetric encryption
integrity and message authentication are provided by ————— and _______________
1.digital signatures
2. message authentication codes
Non-repudiation can be achieved with __________________
digital signatures
what is identification/Peer entity authentication
it is a security service that establishes and verifies the identity of an entity, such as a person or a computer. asks the question “who are you”
what is access control/authorization
it is a security service that restricts access to resources to privileged entities. it decides “who can do what”
what is auditing
it ia security service that provdes evidence of security-relevant activities and keeps logs of certain events. it provides a proof of “ who did what”
what is availability
it is a security service that ensures that the system is accessible and usable on demand by auhtrozed users according to atented goal.
what is physical security
a security service that provides protection against physical tampering and responds to physical tampering attempts.
what is anonymity/privacy
it is a security service that provides protection against the discovery and misuse of identity. it also addresses the questions of “ what happens whne we do not want to be identified”
what is the goal of digital signatures
they function like a signature like function for the electronic world. so mimic conventional (paper) signature
a technique that binds a person/entity to
the digital data.This binding can be independently verified by receiver as well as any third
party
digitial signatures
cryptographic tools serve as the electronic equivalent
of handwritten signatures and provide the same level of authentication,
integrity, and non-repudiation in electronic transactions and
communications.
6 / 34
digital signatures
what are the differences between conventional signatures and digital signatures; name the four
inclusion
verification method
relationship
duplicity
explain the difference between conventional and digital signatures —> inclusion
a conventional signature –> on a document or message
digitals signature –> attached or added as digital code. embedded in the document or message; not apart of document
explain the difference between conventional and digital signatures —> verfication emthod
conventional signature –> comparing signature to known sample
digital signatures —> verified by mathematical algortihms that chekc the signature agaisnt the orginal document
explain the difference between conventional and digital signatures –> relationship
convetional signature –> one to many relationship; so all documents would ahve same signautre if signed by same entity
digital signatures –> one to one; modify one bit, we will have idfferent signature for the message
explain the difference between conventional and digital signatures –> duplicity
convetional signatures –> easily dulciated or forged
digital sginatues —> hard to forge or tamer due to complex encrytpion technolgy
what is the aim of a signature
it is to prove to anyone that a message originated at (or is approved by) a particular user