Process of encryption
An encryption algorithm is used to scramble the data (make it not understandable)
The original data is called the plain text
A key is used to encrypt the data by applying it to the plain text
Plain text is encrypted into cipher text
Process of decryption
An algorithm is used to decrypt the text
The encrypted data is called the cipher text
A key is used to decrypt the data by applying it to the cipher text
Cipher text is encrypted into plain text
Main uses of encryption
To store and transmit information securely.
To make data meaningless if intercepted or stolen
What’s a firewall
Can be software (installed on pc) or hardware (on router)
6 things a firewall does
What can firewalls block
certain websites (IP addresses)
hackers accessing the network
certain ports
malware
8 thing a proxy server does
Extra functions of Proxy Servers
Used to hide the user IP address
Requests are anonymous
Can filter outgoing requests for content
Caches websites
Symmetric encryption
Uses an algorithm and a single shared key
Reducing risk of decryption
Increasing the length (number of bits) of the key
means there are more possible combinations for the key and less chance of decryption by brute force
When sending symmetrically encrypted data, they key must be sent separately to the cipher text
If the key is intercepted when being transmitted it is hard to decrypt the cipher text without the key
Drawbacks of symmetric decryption
Key distribution- hacker could intercept the key when sent over internet and decrypt the ciphertext
Asymmetric encryption
Uses an encryption algorithm and a public + private key
How asymmetric encryption works
Everyone has their own public and private key
Private key is kept safe
Encryption algorithm and public keys are freely available
A message encrypted with a public key can only be decrypted with a private key
A message encrypted with a private key can only be decrypted with a public key
SSL
secure socket layer
has two layers
1. handshake - exchange info
2. record layer - handles data and encryption
Security protocol used to encrypt data to provide a secure connection for the transmission of private data
How SSL works
TLS
Transport layer security
updated version of SSL
is more secure
allows for session caching(to connect quicker)
can be extended by new authentication methods
Examples uses of SSL
Online banking Online shopping Cloud storage Online gaming Email Video conferencing
How do we know TLS/SSL is being used
protocol is HTTPS
Padlock icon is locked
Can view website certificate
Authentication
Verifies data, coming from a trusted source
How are digital signatures used
How are users authenticated
Usernames
Passwords
Biometrics(fingerprint, retina, face and voice scans/recognitions)
Hashing algorithm
Plain text is passed to a hashing algorithm which generates some hashed text
The process is one-way so you cannot get plain text from the hashed text
The process is repeatable so you always get the same hashed text from the plain text