Secure Communication Protocol
11 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Secure communication is when two entities are communicating and do not want a third party to listen in. The entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Cryptography is the practice and study of techniques for securing communication and data in the presence of adversaries. Cryptography is a crucial technique for developing secure systems. Cryptography can provide the following benefits: Confidentiality Confidentiality means ensuring that no one can read a message except the intended receiver. Integrity (Anti-Tampering) Integrity means ensuring the receiver that the received message has not been altered in any way from the original. Authentication Authentication is the process of proving one’s identity. The primary forms of host-to-host authentication on the Internet today are name-based or address-based, both of which are notoriously weak. Non-Repudiation A repudiation is a rejection or denial of something's validity, such as refusing to fulfill a legal contract.

Nonrepudiation is used in information security to ensure that an individual or organization obligated by contractual obligation cannot deny the authenticity of their signature on the original contract

nonrepudiation

Symmetric Key Cryptography To encrypt plaintext, a cryptographic algorithm employs a ______ - a word/number/character

key

Symmetric key cryptography, also known as secret key cryptography or conventional cryptography, is an encryption system in which the sender and receiver of a message share a single key for encrypting and decrypting the message

<p>symmetric</p> Signup and view all the answers

Symmetric encryption is mainly used in day-to-day communication channels, especially over the internet. SSH is an example of a protocol that uses it

<p>symmetric</p> Signup and view all the answers

The most widely used symmetric ______ are AES-128, AES-192, and AES-256. The number of each algorithm 128, 192, and 256 is the bit key length to encrypt and decrypt a block of messages

<p>algorithms</p> Signup and view all the answers

Asymmetric cryptography, also known as public-key cryptography, is a cryptographic algorithm that requires two separate keys, one private and the other public. The message is encrypted with the public key and decrypted with the private key

<p>asymmetric</p> Signup and view all the answers

The concept of asymmetric ______ is similar to that of a public mailbox: The mailbox is open to the public, and anyone who knows its location can approach it and drop a letter in. However, only authorized parties (mail carriers) have access to the letters and their contents. Thus, the mailbox location is our public key. The mailbox owner holds the private key, which is used to access its contents

<p>encryption</p> Signup and view all the answers

Let's say Alice wants to send an encrypted ______ to Bob. How can she do this

<p>document</p> Signup and view all the answers

Key ______ is a persistent problem with conventional encryption: How can you deliver the key to the intended recipient without it being intercepted

<p>distribution</p> Signup and view all the answers

Digital Signature Standard (DSS) is a Federal Information Processing Standard that prov

<p>standard</p> Signup and view all the answers

More Like This

Internet Communication Quiz
3 questions
Secure Protocol Implementation Quiz
5 questions
Kriptografski Protokoli
29 questions

Kriptografski Protokoli

InfallibleBalalaika avatar
InfallibleBalalaika
DoD Flashcards on Classified Transmission
92 questions
Use Quizgecko on...
Browser
Browser