Coputer Security Tips
Coputer Security Tips
✓ Cryptography
✓ Symmetric encryption
✓ Asymmetric encryption
✓ Public keys
✓ Private keys
Answers
✓ Cryptography is the practice and study of the techniques for securing communication and
data from adversaries or intrusion. It involves the use of mathematical algorithms and
principles to convert plain text(human-readable data) into cipher text( unreadable data) so
that only authorized people can access the original information. The following are some
key concepts in cryptography.
1. Confidentiality: Cryptography ensures that sensitive informations are concealed
or hidden from unauthorized user access by encrypting the data to obscure its
content.
2. Authentication: Cryptography provides mechanisms for verifying the identity of
communicating parties and ensuring that messages come legitimate sources.
3. Integrity: Cryptography verifies that the integrity of data, ensuring that it has not
been altered or changed during the transmission or storage.
4. Non-repudiation: Cryptography enables non-repudiation, meaning that a sender
cannot deny having sent a message or signed a document.
✓ Symmetric encryption is a type of cryptography where the same key is used for both
decryption and encryption. This must be kept secret and shared securely between
communicating parties. Examples include DES (Data Encryption Standard) and AES
(Advanced Encryption Standard).
✓ Public key: The public key is freely distributed and made available to anyone who wants
to communicate securely with the owner of the key. It is used for encryption and
verifying signatures. However, it cannot be used for decryption.
✓ Private key: The private is a secret key and known to only the user. It is used for
decryption and creating signatures. The private key corresponds mathematically to the
public key and is essential for decrypting messages encrypted with the corresponding
public key.
Here is how public and private keys are used practically.
If Alice wants to send a secure message to Bob, she encrypts it using Bob’s public key. Only
Bob, with his corresponding private key can decrypt and read the message.
✓ Decryption: The reverse process of converting ciphertext back into plaintext using a
decryption algorithm and the corresponding key.
✓ Hashing: Is a one-way function that converts input data into fixed-size string
representations (hashes). Common hash functions include SHA-256 and MD5.
Answers
✓ Cryptography is used to secure communication channels such as emails, instant
messaging, and VPNs (Virtual Private Networks).
Answers
✓ Brute Force Attack: Trying every possible key until the correct one is found.
#BELIEVE IN MAKIND
#MALIK IS COMING