0% found this document useful (0 votes)
30 views21 pages

17 Security Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views21 pages

17 Security Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Data Encryption

Encryption is the conversion of electronic data into another form, called cipher text, which cannot
be easily understood by anyone except authorized parties.
The word encryption comes from the Greek word kryptos, meaning hidden or secret.

Caesar Cipher (Encryption)


The earliest known and simplest ciphers. The method is named after Julius Caesar.
It is a type of substitution cipher in which each letter in the plaintext is 'shifted' a certain number of
places down the alphabet.
2 | Page
For example, with a shift of -4, A would be replaced by X, D would become 4, and so on.

Encryption makes the data meaningless unless the recipient has the necessary decryption tools.
There are two types of encryption:
SYMMETRIC ENCRYPTION is a method of encryption in which one key is required to encrypt and
decrypt the data.
ASYMMETRIC ENCRYPTION (also known as Public Key Encryption)is a method of encryption in which
one key (public key) is required to encrypt and other key (private key) to decrypt the data.
Symmetric Encryption

KEY Distribution Problem:


In symmetric key encryption the sender has to supply the encryption key to the recipient. But this
key could be hacked, which puts the security of the encrypted message at risk. This problem is
known as key distribution problem.
3 | Page
The student is interested in how simple encryption could be applied to a text message.
One of the simplest forms of encryption is a method of ‘substitution’ where each character
has a unique substitute character.
The student uses this method with the following character substitutions:
Message character A B C D E F G H I J K L M
Substitute character P L F N O C Q U D Z V G I

Message character N O P Q R S T U V W X Y Z
Substitute character X M W J B K E A H S Y R T
Assume all messages are made up from the upper-case characters only.
Show the string after the message AT SEVEN is encrypted.
................................................................................................................................................
................................................................................................................................................
...........................................................................................................................................[2]
Show the string after a cypher text “FMIWKGD IPKEOBK” is decoded.
................................................................................................................................................
................................................................................................................................................
......................................................................................................................................... [2]
Symmetric encryption uses a single key.
Explain how a message is encrypted and decrypted using symmetric encryption.
................................................................................................................................................
................................................................................................................................................
......................................................................................................................................... [2]
4 | Page
ASYMMETRIC (PUBLIC KEY) ENCRYPTION
Public-key encryption is a cryptographic system that uses two keys
-- a public key known to everyone
-- and a private or secret key known only to the owner of the key.
If a message is encrypted by Public key it can only be decrypted by associated Private
key.
If a message is encrypted by private key it can only be decrypted by associated public key.

Example 1: When Bob wants to send a secure message to Alice, he uses Alice’s public
key to encrypt the message. Alice then uses her private key to decrypt it. (To make not-
understandable for others)

Example 2: When Alice wants to ensure that the message is sent by her (to verify the
sender and message is not altered, not to make message secure (may remain readable
for others), she encrypts her message using her own private key.
Then the message is transmitted to Bob.
Bob decrypts the message using Alice’s public key.
The decryption of message by Alice’s public key confirms that this is Alice’s message, and
is without any alteration.
5 | Page
Example 3 (Exam style question): Bill, a manager of a company, sent an email with very
sensitive information to a work colleague, Alison. However, Bill also accidentally sent it to
everybody in the company.
Describe the method used that ensured only Alison was able to read the original contents
of the email.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
..................................................................[4]
Answer Key
Manager encrypts email using Alison’s public key
Alison decrypts email his own private key

Example 4 (Exam style question): Alexa sends an email to Beena.


Explain how Beena can be sure that she has received a message that is authentic (not
corrupted or tampered with) and that it came from Alexa.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
..........................................[2]
Answer Key
Alexa will encrypts her message using her own private key.
Beena will decrypts the message using Alexa’s public key.
If message is decrypted by Alexa’s public key, it shows that message is authentic (sent by
Alexa and not tempered).
6 | Page
Digital Certificates

https://www.us-cert.gov/ncas/tips/ST04-014
If an organization wants to have a secure web site that uses encryption, it needs to obtain a
site, or host, certificate.
There are two elements:
➢ a closed padlock,
➢ URL that begins with "https:"
rather than "http:"
If a web site has a valid certificate, it means that a certificate authority has taken steps to
verify that the web address actually belongs to that organization. When you type a URL or
follow a link to a secure web site, your browser will check the certificate for the following
characteristics:
1. The web site address matches the address on the certificate
2. The certificate is signed by a certificate authority that the browser recognizes as a
"trusted" authority
If the browser senses a problem, it may present you with a dialog box that claims that there
is an error with the site certificate.
If you have chosen not to trust the company who issued the certificate, or if the certificate
has expired. You will usually be presented with the option to examine the certificate, after
which you can accept the certificate forever, accept it only for that particular visit, or choose
not to accept it.
7 | Page
Obtaining Digital/Security certificates
Digital certificates are used in Internet communications. A Certificate Authority (CA) is
responsible for issuing digital certificates.
It contains Name of certification authority, Public key of company and Expiry date.
The method of issuing a digital certificate is as follows:
1. A user starts an application for a digital certificate using their computer. On this
computer a key pair is generated. This key pair consists of a public key and an
associated private key.
2. The user submits the application to the CA. The generated public key and other
application data are sent.
3. The key and data are encrypted using the CA’s private key.
4. The CA creates a digital document containing all necessary data items and signs it
using the CA’s public key.
5. The CA sends the digital certificate to the individual.
8 | Page
HASHING ALGORITHM
The hashing algorithm takes a message or a key and translates it into a string of
characters usually shown in hexadecimals essentially makes the message or key almost
impossible to read ‘meaningless’ text. This is also known as message digest.

Plain Text
1234 5678 9012 3456
Message Digest Algo 4 MD4

Cypher Text
543FC7DDEA0CF5EAF84279CBADCA180D

Authentication
Authentication means the receiver is certain who sent the cipher text.
For authentication passwords, digital certificates and digital signatures are used/
Digital signature
A digital signature is a mathematical scheme for verifying the authenticity
of digital messages or documents. A valid digital signature gives a recipient reason to
believe that the message was created by a known sender (authentication), that the sender
cannot deny having sent the message (non-repudiation), and that the message was not
altered in transit.
How digital signature works
• Sender applies HASH algorithm on the message.
• Message digest is created.
• Sender encrypts the message digest using his own private key. This encrypted
message digest is called Digital Signature.
• Plain text along with digital signature is sent to recipient.

Receiver receives both plain message and digital signature


Receiver applies the same HASH algorithm on message and obtains message digest
9 | Page
Receiver then encrypts the receiving digital signature using sender’s public key to obtain
sender’s message digest.
Receiver compares his own generated message digest with the sender’s message digest.
If both matches then message is sent from the intended source.
Digital signature is used to identify the sender.
10 | P a g e

PASSWORD Lower- and


Numbers only upper-case
Hacked instantly. letters
27 minutes to
hack

Lower- and
upper-case
letters, symbols
Lowercase and numbers
letters Characters long 8 hours to
5 sec to hack
hack.

PASSWORD Lower- and


Numbers only upper-case

13
4 mins to hack. letters
16K years
to hack

Lower and
upper case
letters, symbols
Lowercase and numbers
Characters long
letters
1 year to hack 2M years to
hack
11 | P a g e
Quantum Key Distribution

Purpose, benefits and drawbacks of quantum cryptography

Quantum key distribution (QKD) is a secure communication method which implements a cryptographic
protocol involving components of quantum mechanics. It enables two parties to produce a shared random
secret key known only to them, which can then be used to encrypt and decrypt messages.

Quantum key distribution (QKD) is the only provably secure


communication method because it uses physics – not math – to
encrypt data.
Quantum mechanics provides fundamental laws of physics applicable to the behaviour of
particles. The particles that transmit light are called photons. Photons demonstrate wave
behaviour, so that each photon appears to vibrate in a particular direction at right angles to
its direction of travel. The direction each photon vibrates in is called its polarisation, and
is represented in a diagram as a double-ended arrow. If we allow four possibilities for the
state of polarisation there are two ways to represent a 1 and two ways to represent a 0.
This can be illustrated as follows:

Diagonal (X): 1 0 Horizonat/Vertical (+) : 1 0

https://www.youtube.com/watch?v=LaLzshIosDk
How Does QKD Work?
QKD works by transmitting millions of polarized light particles (photons) over a fibre optic
cable from one entity to another. Each photon has a random quantum state, and collectively
all the photons create a bit stream of ones and zeros. For example:
Bit values sent 1 0 1 1 0 0 0 1 0 1
Polarisation basis
When the photons arrive at the endpoint, the receiver uses beam splitters (horizontal/vertical
and diagonal) to “read” the polarization of each photon. The receiver does not know which
beam splitter to use for each photon and has to guess which one to use. After the receiver
tells the sender which beam splitter was used for each of the photons in the sequence they
were sent, the sender then compares that information with the sequence of polarizers used
to send the photons. The photons that were read using the wrong beam splitter are
discarded, and the resulting sequence of bits becomes a unique optical key that can be used
to encrypt data.
Bit values sent 1 0 1 1 0 0 0 1 0 1
Polarisation basis by sender
Polarisation chosen by receiver
Bit values confirmed 1 0 0 1
Encryption Key generated 1001
12 | P a g e
What makes QKD unbreakable?

The security of QKD stems from the ability to detect any intrusion on the QKD transmission.
Because of the unique and fragile properties of photons, any third party (or eavesdropper)
who tries to read or copy the photons in any way will change the photons’ state.
The change will be detected by the endpoints, alerting them that the key has been tampered
with and must be discarded. A new key is then transmitted. Moreover, since the keys
generated are truly random, they are protected from future hacking attempts.
Drawback of Quantum Key Distribution
The main drawback of quantum cryptography is that it cannot be implemented using
standard communication media. It requires a dedicated, special purpose ‘quantum
channel’ between sender and receiver. The costs of providing this are very high so routine
use is unlikely.
0-9618 Specimen Paper 3

5 Ed wants to send a message securely. Before sending the message, the software
encrypts it using a symmetric key.
(a) (i) Describe what is meant by symmetric key encryption.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
............................................................................................................. [2]
(ii) State two drawbacks of using symmetric key encryption.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
............................................................................................................. [2]
(b) The symmetric key is to be exchanged before the message is sent.
To exchange the key securely, the use of quantum cryptography is being considered.
State two possible benefits of using quantum cryptography.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
13 | P a g e
................................................................................................................................................
........................................................................................................................................ [2]

2ab Winter 2022 P31-32

8 (a) Describe the purpose of the Secure Sockets Layer (SSL) and Transport Layer
Security (TLS) protocols.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
.......................................................................................................................................... [2]
(b) Explain how SSL/TLS protocols are used when a client-server communication is
initiated.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
.......................................................................................................................................... [4]
14 | P a g e

3ac S22 9618 P31_33


8 A message is to be sent securely. Software uses a key to encrypt the message before it i
s sent.
(a) (i) Give two reasons for using key cryptography.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
........................................................................................................................................... [2]
(ii) Give two methods of key cryptography that can be used.
1 ........................................................................................................................................
2 ........................................................................................................................................ [2]
(b) When there is a secure exchange of key(s), the message is sent.
The use of quantum cryptography is being considered for the secure exchange.
(i) State two possible benefits of using quantum cryptography.
1..............................................................................................................................................
................................................................................................................................................
............................................................................................................................................
2..............................................................................................................................................
................................................................................................................................................
................................................................................................................................ [2]
(ii) State two possible drawbacks of using quantum cryptography.
1 ........................................................................................................................................
15 | P a g e
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]

3b 9618 S22 P32


7 A digital signature is used to validate the authenticity of an electronic message.
In order to produce a digital signature, a digital certificate is required.
(a) State how a digital certificate is obtained.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
.......................................................................................................................................... [3]
(b) (i) Explain how a digital signature is produced before the message is sent.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
.................................................................................................. [3]
16 | P a g e
(ii) Explain how the digital signature can be checked on receipt to ensure that the messag
e has not been altered during transmission.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
.................................................................................................. [4]

Q1) In a simple symmetric encryption system, each letter of the alphabet is substituted
with another. The plain text message:
The Quick brown Fox jumps over a lazy dog.
becomes the cypher text message:
Zag towns jumpy Dmh coilv mwgu f bfke rmq

(a) (i) Convert these words to cypher text.


Computer Science
................................................................................................................................................
..................................................................................................................................... [2]
(ii) Decode this cypher text message.
LFD Naflzgu
................................................................................................................................................
.................................................................................................................................... [2]
(b) Both the person who sends the message and the person who receives it need to know
what the substitution key is, and they need to keep this secret. A copy of the
substitution key has been sent using SSL transmission.
Explain why this keeps the copy of the key secret during transmission.
................................................................................................................................................
................................................................................................................................... [2]
17 | P a g e
(d) A user downloads software from the Internet.
(i) State what should be part of the download to provide proof that the software is
authentic?
.......................................................................................................................................[1]
(ii) Describe the process for ensuring that the software is both authentic and has not been
altered.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
............................................................................[4]

Q 3) Digital certificates are used in Internet communications. A Certificate Authority (CA) is


responsible for issuing digital certificates.
(a) Name three data items present in a digital certificate.
1 .............................................................................................................................................
.
2 .............................................................................................................................................
3 .........................................................................................................................................[3]
(b) The method of issuing a digital certificate is as follows:
1 A user starts an application for a digital certificate using their computer. On this computer
a key pair is generated. This key pair consists of a public key and an associated private
key.
2 The user submits the application to the CA. The generated ........(i) ........key and other
application data are sent. The key and data are encrypted using the CA’s ........(ii) ........key
before sending to CA.
3 The CA creates a digital document containing all necessary data items and signs it using
18 | P a g e
the CA’s ........(iii) ........key.
The CA sends the digital certificate to the individual.
In the above method there are three missing words. Each missing word is either ‘public’ or
‘private’.
State the correct word. Justify your choice.
(i) ...........................................................................................................................................
Justification ........................................................................................................................
.......................................................................................................................................[2]
(ii) ...........................................................................................................................................
Justification ........................................................................................................................
.......................................................................................................................................[2]
(iii) ..........................................................................................................................................
.
Justification ........................................................................................................................
.......................................................................................................................................[2]

(c) Alexa sends an email to Beena.


Alexa’s email program:
• produces a message digest (hash)
• uses Alexa’s private key to encrypt the message digest
• adds the encrypted message digest to the plain text of her message
• encrypts the whole message with Beena’s public key
• sends the encrypted message with a copy of Alexa’s digital certificate
Beena’s email program decrypts the encrypted message using her private key.
(i) State the name given to the encrypted message digest.
.......................................................................................................................................[1]
(ii) Explain how Beena can be sure that she has received a message that is authentic (not
corrupted or tampered with) and that it came from Alexa.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
........................................................................................................................[2]
(iii) Name two uses where encrypted message digests are advisable.
1 ........................................................................................................................................
2 ....................................................................................................................................[2]
19 | P a g e
20 | P a g e
Q 4 a) The table below gives descriptions of three types of malware.
Description Term
Malware that attaches itself to another program.
Malware that redirects the web browser to a fake website.
Email that encourages the receiver to access a website and give their banking
details.
Complete the table by adding the correct terms. [3]
(b) Ben wants to send a highly confidential email to Mariah so that only she can read it.
Plain text and cipher text will be used in this communication.
(i) Explain the terms plain text and cipher text.
Plain text ............................................................................................................................
...........................................................................................................................................
Cipher text .........................................................................................................................
...................................................................................................................................... [2]
(ii) Explain how the use of asymmetric key cryptography ensures that only Mariah can
read the email.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
............................................................................. [4]
(a)
Description Term
Malware which attaches itself to another program. VIRUS
Malware designed to redirect the web browser to a fake website. PHARMING
Email that encourages the receiver to access a website and give their banking
PHISHING
details.
(b) (i) Plain text is the original text
Cipher text is the encrypted version of the plain text
(ii) Asymmetric keys means that the key used to encrypt (public key) is different from the key used
to decrypt (private key)
Ben acquires Mariah’s public key
Ben encrypts email …
using Mariah’s public key
Ben sends encrypted email to Mariah
Mariah decrypts email …
Using her private key
21 | P a g e
Q 5) Anna has to send an email to Bob containing confidential information. Bob and Anna
have never sent emails to each other before.
Bob and Anna both have public and private keys.
The first step is for Anna to request that Bob sends her one of his keys.
(i) State the key that Bob sends. .......................................................................................[1]
(ii) Explain how Anna can be sure that it is Bob who has sent the key.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
........................................................................................................................[2]

(iii) Anna has received the key from Bob.


The following incomplete table shows the sequence of actions between Anna and Bob to
communicate the confidential information.
Complete the table. [4]
The person
What that person does
performing the action
Anna Requests Bob’s <answer to part (c)(i)> key.
Bob
...................................................................................................
Anna
..................................................................................................
Anna Sends the email to Bob.
Bob
.................................................................................................

You might also like