Purpose Key Cryptography
Asymmetric Encryption - Explain (4 - 5 marks)
Process of communication using Asymmetric Encryption
How will the sender/ receiver realise that their massage has been altered? (4 marks)
What is Symmetric Encryption
Symmetric Encryption
- Uses a single key which is used/ shared by all to encrypt and decrypt messages
- Simple process that can be carried out quickly, higher risk of compromise
- Shorter key length when compared to asymmetric encryption
What is Quantum Cryptography
2 Advantages and Disadvantages of Quantum Cryptography
Advantages
- Detects any Eavesdropping from the change of photons
- Once transferred, the integrity of the key can be guaranteed: It cannot be copied nor decrypted later
- More secure, longer keys are used
Disadvantages
- Expensive
- Limited Range
- Polarization of light may be altered during the transmission through the fibre optic cable
- Its new: Still lack vital features and has high error rate
What is a Private Key
SSL/ TLS use when Client - Server Communication is Initiated
SSL/ TLS Connection is initiated by an application which becomes the client
- Application which receives the connection becomes the server
Every new session begins with a handshake
- A digital certificate is requested from the client
- The requested certificate is then sent by the server
- The client verifies the server’s digital certificate and obtain the server’s public key
- Encryption algorithm are agreed upon by the client and server
Key pair is generated
How are Digital Signatures acquired
How is a Digital Signature produced before a message is sent?
What is a Digital Certificate
Its an:
- Electronic/ Online document used to authenticate the identity of a website/ individual/ organisation
- Typically issued by the CA
- Contains information for identifying an individual/ website owner as well as a public key
Role of Certificate Authority in creating a Digital Signature