0% found this document useful (0 votes)
30 views5 pages

Coputer Security Tips

Computer Security Tips

Uploaded by

masonwhite8907
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views5 pages

Coputer Security Tips

Computer Security Tips

Uploaded by

masonwhite8907
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

• Explain the following

✓ Cryptography
✓ Symmetric encryption
✓ Asymmetric encryption
✓ Public keys
✓ Private keys

Answers
✓ Cryptography is the practice and study of the techniques for securing communication and
data from adversaries or intrusion. It involves the use of mathematical algorithms and
principles to convert plain text(human-readable data) into cipher text( unreadable data) so
that only authorized people can access the original information. The following are some
key concepts in cryptography.
1. Confidentiality: Cryptography ensures that sensitive informations are concealed
or hidden from unauthorized user access by encrypting the data to obscure its
content.
2. Authentication: Cryptography provides mechanisms for verifying the identity of
communicating parties and ensuring that messages come legitimate sources.
3. Integrity: Cryptography verifies that the integrity of data, ensuring that it has not
been altered or changed during the transmission or storage.
4. Non-repudiation: Cryptography enables non-repudiation, meaning that a sender
cannot deny having sent a message or signed a document.

✓ Symmetric encryption is a type of cryptography where the same key is used for both
decryption and encryption. This must be kept secret and shared securely between
communicating parties. Examples include DES (Data Encryption Standard) and AES
(Advanced Encryption Standard).

✓ Asymmetric encryption, also known as public-key cryptography is a type of cryptography


that involves the use of a pair of keys: public key for encryption and private key for
decryption. Examples include RSA and Elliptic Curve Cryptography (ECC).

✓ Public key: The public key is freely distributed and made available to anyone who wants
to communicate securely with the owner of the key. It is used for encryption and
verifying signatures. However, it cannot be used for decryption.

✓ Private key: The private is a secret key and known to only the user. It is used for
decryption and creating signatures. The private key corresponds mathematically to the
public key and is essential for decrypting messages encrypted with the corresponding
public key.
Here is how public and private keys are used practically.
If Alice wants to send a secure message to Bob, she encrypts it using Bob’s public key. Only
Bob, with his corresponding private key can decrypt and read the message.

• List and explain four cryptographic techniques


Answers
✓ Encryption: The process of converting plaintext into ciphertext using an encryption
algorithm and a key. Common encryption algorithms include AES (Advanced Encryption
Standard) and RSA (Rivest-Shamir-Adleman).

✓ Decryption: The reverse process of converting ciphertext back into plaintext using a
decryption algorithm and the corresponding key.

✓ Digital Signatures: Used to verify the authenticity and integrity of messages or


documents. They involve encrypting a hash of the message with the sender's private key.

✓ Hashing: Is a one-way function that converts input data into fixed-size string
representations (hashes). Common hash functions include SHA-256 and MD5.

• Explain four applications of cryptography

Answers
✓ Cryptography is used to secure communication channels such as emails, instant
messaging, and VPNs (Virtual Private Networks).

✓ Cryptographic techniques are essential for secure online transactions, including e-


commerce and online banking.

✓ Cryptography is used in digital rights management (DRM) systems to protect copyrighted


content from unauthorized distribution.
✓ It ensures the confidentiality of sensitive data in storage and transmission, such as
personal information and financial transactions.

• Mention and explain four cryptographic attacks

Answers
✓ Brute Force Attack: Trying every possible key until the correct one is found.

✓ Cryptanalysis: Analyzing cryptographic systems to exploit weaknesses and break them.

✓ Man-in-the-Middle Attack: Intercepting and possibly altering communication between


two parties.

✓ Side-Channel Attack: Exploiting information leaked by the physical implementation of


cryptographic systems, such as power consumption or timing information.

#BELIEVE IN MAKIND
#MALIK IS COMING

You might also like