Part 3, Cryptography: The secret of keeping secrets Flashcards
the faking of these is mitigated by using digital certificates instead
how has the faking of
digital signatures
been mitigated
- Both server and browser turn the pre master secret into a master secret by using the time stamp and random data that was produced by the server in previous steps
- Both browser and server use the master secret to create identical symmetric session keys. When the browser has finished creating its key it will notify the server that it is ready to start exchanging confidential data using the agreed symmetric encryption method
in two steps what happens during
the generating a symmetric key
part of an SSL/TLS connection
- Handshake
- Verification
- The pre master secret
- Generating a symmetric key
when a browser wishes to have secure communications with a server using
SSL/TLS
what are the four overview steps
what is
Encryption / encipherment
this is the process of turning plaintext into ciphertext
- this is a ‘one way operation’. meaning it is easy to produce but practically impossible to reverse the operation
- the change of a single bit will produce a wildly different result. meaning the integrity of data can easily be confirmed
name two beneficial characteristics of
hashing
what is the
comparison of key lengths
between symmetric encryption and asymmetric encryption
Symmetric encryption rarely uses key lengths above 256 bits. But in contrast asymmetric key lengths are frequently 1024, 2048, 4096.
The use of a larger key length here does not imply more security over symmetric encryption. The reason lies in the mathematics and so its hard to compare the two relative to each other in this way
describe in 7 steps the process of
salting
- User creates a password ‘hello’
- The computer storing the password then generates a salt ‘7456’
- The salt is added to the front or end of the original password ‘hello7456’
- The salted password is then hashed
- The salt and the hashed password will then be encrypted
- The hashed password will then be saved in a database along with the salt
- When retrieving the password the users password is combined with the decrypted salt and then hashed this is then compared with the hash in the database
- this is fast and can be performed in hardware or software
- It uses smaller keys which means its quicker to generate and use symmetric keys
- It is well suited to encrypt data of any size even if the final size is unknown such as a live video call
name three advantages that
symmetric encryption
has
when was it recommended by the US government to start using
Triple DES (3DES)
the use of this encryption algorithm was recommended in 1999
this will take plaintext and a key as inputs and will output ciphertext
what are the inputs and outputs of an
encryption function
this replaced DES
which encryption algorithm did
Advanced encryption standard (AES)
go on to replace
this is a key which can be shared with anyone you wish to share
encrypted messages with
it is the only key that can decrypt messages that were encrypted by the corresponding private key
what is a
public key
- Issuer information - who issued the certificate
- Date information - in what time line is the certificate valid
- Subject information - who was the certificate issued to and what are their contact details (location, email, website)
-
Public key information
- what asymmetric algorithm produced the public key
- the public key itself
- Acceptable use of the certificate (for digital signatures or encryption)
- Digital signature information
- details of the algorithm used to create the digital signature
- A digital signature belonging to the issuer of the certificate
- Thumbprint / fingerprint - this is a hash of the certificates content
what will you find inside a digital certificate
what is the full name for the hashing algorithm
SHA
what is the accronym used for
secure hash algorithm
when was
Data encryption standard (DES)
populary used and what gave it its popularity
this was used between 1976 and 1999 its popularity came from:
- support from government and industry
- Its strong encryption
- Its ability to encrypt large amounts of data at great speed
this was used between 1976 and 1999 its popularity came from:
- support from government and industry
- Its strong encryption
- Its ability to encrypt large amounts of data at great speed
when was
Data encryption standard (DES)
populary used and what gave it its popularity
what is a
digital signature
A feature of asymmetric cryptography is that it allows you to sign a document before sending it
since only the public key that is registered with the private key can decrypt this it must have come from the sender
name two beneficial characteristics of
hashing
- this is a ‘one way operation’. meaning it is easy to produce but practically impossible to reverse the operation
- the change of a single bit will produce a wildly different result. meaning the integrity of data can easily be confirmed
in four steps what happens during
the handshake
of a SSL/TLS connection
- The browser sends to the server a hello message followed by a timestamp and a random piece of data
- The browser sends a list of asymmetric and symmetric encryption algorithms it knows as well as hashing algorithms
- The server responds with a hello message followed by a timestamp and a random piece of data. It then selects the best asymmetric cipher, symmetric cipher and hashing algorithm from the list it received. The server then lets the browser know its choices
- The handshake is concluded by the server sending the browser its digital certificate
what is a
certificate authority (CA)
this is a trusted third party that issues digital certificates
what is a
cipher
this is the algorithm responsible for turning plaintext into cyphertext and vice versa by using a set of one or more keys
- this was discovered by james ellis in 1973 and kept secret by the british until 1997
in 1976 two groups In the us rediscovered this:
- whitfield diffie and martin hellman published a paper describing it
- Ron rivest, adi shamir, leonard adleman rediscovered the algorithm the british were using
when was
asymmetric encryption
discovered
At the end of the secure session between browser and server both will say goodbye and delete the pre master secret they hold as well as the symmetric key. If any new session is required after this a new handshake and key generation will be needed
what happens at the end of a secure
SSL/TLS session
how has the faking of
digital signatures
been mitigated
the faking of these is mitigated by using digital certificates instead