Podcast
Questions and Answers
Secure communication is when two entities are communicating and do not want a third party to listen in. The entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Cryptography is the practice and study of techniques for securing communication and data in the presence of adversaries. Cryptography is a crucial technique for developing secure systems. Cryptography can provide the following benefits: Confidentiality Confidentiality means ensuring that no one can read a message except the intended receiver. Integrity (Anti-Tampering) Integrity means ensuring the receiver that the received message has not been altered in any way from the original. Authentication Authentication is the process of proving one’s identity. The primary forms of host-to-host authentication on the Internet today are name-based or address-based, both of which are notoriously weak. Non-Repudiation A repudiation is a rejection or denial of something's validity, such as refusing to fulfill a legal contract.
Secure communication is when two entities are communicating and do not want a third party to listen in. The entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Cryptography is the practice and study of techniques for securing communication and data in the presence of adversaries. Cryptography is a crucial technique for developing secure systems. Cryptography can provide the following benefits: Confidentiality Confidentiality means ensuring that no one can read a message except the intended receiver. Integrity (Anti-Tampering) Integrity means ensuring the receiver that the received message has not been altered in any way from the original. Authentication Authentication is the process of proving one’s identity. The primary forms of host-to-host authentication on the Internet today are name-based or address-based, both of which are notoriously weak. Non-Repudiation A repudiation is a rejection or denial of something's validity, such as refusing to fulfill a legal contract.
Nonrepudiation is used in information security to ensure that an individual or organization obligated by contractual obligation cannot deny the authenticity of their signature on the original contract
Nonrepudiation is used in information security to ensure that an individual or organization obligated by contractual obligation cannot deny the authenticity of their signature on the original contract
nonrepudiation
Symmetric Key Cryptography To encrypt plaintext, a cryptographic algorithm employs a ______ - a word/number/character
Symmetric Key Cryptography To encrypt plaintext, a cryptographic algorithm employs a ______ - a word/number/character
key
Symmetric key cryptography, also known as secret key cryptography or conventional cryptography, is an encryption system in which the sender and receiver of a message share a single key for encrypting and decrypting the message
Symmetric key cryptography, also known as secret key cryptography or conventional cryptography, is an encryption system in which the sender and receiver of a message share a single key for encrypting and decrypting the message
Signup and view all the answers
Symmetric encryption is mainly used in day-to-day communication channels, especially over the internet. SSH is an example of a protocol that uses it
Symmetric encryption is mainly used in day-to-day communication channels, especially over the internet. SSH is an example of a protocol that uses it
Signup and view all the answers
The most widely used symmetric ______ are AES-128, AES-192, and AES-256. The number of each algorithm 128, 192, and 256 is the bit key length to encrypt and decrypt a block of messages
The most widely used symmetric ______ are AES-128, AES-192, and AES-256. The number of each algorithm 128, 192, and 256 is the bit key length to encrypt and decrypt a block of messages
Signup and view all the answers
Asymmetric cryptography, also known as public-key cryptography, is a cryptographic algorithm that requires two separate keys, one private and the other public. The message is encrypted with the public key and decrypted with the private key
Asymmetric cryptography, also known as public-key cryptography, is a cryptographic algorithm that requires two separate keys, one private and the other public. The message is encrypted with the public key and decrypted with the private key
Signup and view all the answers
The concept of asymmetric ______ is similar to that of a public mailbox: The mailbox is open to the public, and anyone who knows its location can approach it and drop a letter in. However, only authorized parties (mail carriers) have access to the letters and their contents. Thus, the mailbox location is our public key. The mailbox owner holds the private key, which is used to access its contents
The concept of asymmetric ______ is similar to that of a public mailbox: The mailbox is open to the public, and anyone who knows its location can approach it and drop a letter in. However, only authorized parties (mail carriers) have access to the letters and their contents. Thus, the mailbox location is our public key. The mailbox owner holds the private key, which is used to access its contents
Signup and view all the answers
Let's say Alice wants to send an encrypted ______ to Bob. How can she do this
Let's say Alice wants to send an encrypted ______ to Bob. How can she do this
Signup and view all the answers
Key ______ is a persistent problem with conventional encryption: How can you deliver the key to the intended recipient without it being intercepted
Key ______ is a persistent problem with conventional encryption: How can you deliver the key to the intended recipient without it being intercepted
Signup and view all the answers
Digital Signature Standard (DSS) is a Federal Information Processing Standard that prov
Digital Signature Standard (DSS) is a Federal Information Processing Standard that prov
Signup and view all the answers