1. Encryption
- Definition: Encryption is the process of converting readable data (plain text) into an unreadable format (cipher text) to prevent unauthorized access.
- Purpose: Ensures data confidentiality and secures communication.
Types of Encryption
- Symmetric Encryption:
- How It Works: Same key is used for both encryption and decryption.
- Examples:
- AES (Advanced Encryption Standard): Strong and widely used.
- DES (Data Encryption Standard): Older, now considered insecure.
- 3DES: Improvement over DES but slower.
- Pros: Fast and efficient.
- Cons: Key management is a challenge (key must be securely shared).
- Asymmetric Encryption:
- How It Works: Uses a pair of keys:
- Public Key: Used for encryption.
- Private Key: Used for decryption.
- Examples:
- RSA: Common for secure communication (e.g., HTTPS).
- ECC (Elliptic Curve Cryptography): Faster and secure for mobile devices.
- Pros: Secure key exchange.
- Cons: Slower than symmetric encryption.
- How It Works: Uses a pair of keys:
Encryption Algorithms
- AES:
- Used in WPA2 for securing Wi-Fi networks.
- Block sizes: 128, 192, or 256 bits.
- RSA:
- Based on factoring large numbers.
- Used in SSL/TLS for website security.
- DES/3DES:
- Block size: 64 bits (DES).
- 3DES applies DES three times for better security.
- ECC:
- Efficient for resource-constrained devices.
- Key size: Much smaller than RSA but equally secure.
Important Features of Encryption
- Confidentiality: Only authorized users can read the data.
- Integrity: Ensures data isn’t altered during transmission.
- Authentication: Verifies the sender’s identity (often paired with hashing).
Common Use Cases
- Data at Rest: Securing files, hard drives, or databases.
- Example: Full Disk Encryption (FDE).
- Data in Transit: Securing communication over the network.
- Example: HTTPS, VPNs.
- Applications:
- Emails (PGP).
- Secure messaging (WhatsApp uses end-to-end encryption).
Quick Recap Table
Type | Key Used | Examples | Strength | Weakness |
---|---|---|---|---|
Symmetric | Same key (shared) | AES, DES, 3DES | Fast, efficient | Key distribution problem |
Asymmetric | Public/Private pair | RSA, ECC | Secure key exchange | Slower, computationally heavy |
Tips to Remember
- Symmetric Encryption: One key. Think “fast but needs trust.”
- Asymmetric Encryption: Two keys. Think “secure handshake.”
- AES > DES: Always choose AES for stronger encryption.
2. Hashing
- Definition: Hashing is a process of converting input data of any size into a fixed-size string of characters, called a hash value or digest.
- Purpose:
- Ensures data integrity (detects tampering).
- Provides efficient data retrieval in databases.
- Secures sensitive data like passwords.
2. Key Features of Hashing
- Deterministic: Same input always produces the same hash.
- Fixed Output Size: Regardless of input size, the hash is a fixed length.
- Example: SHA-256 produces a 256-bit hash.
- Irreversibility: Hash values cannot be converted back to the original input.
- Collision Resistance: Two different inputs should not produce the same hash.
- Fast Computation: Hash functions should be computationally efficient.
3. Popular Hashing Algorithms
- MD5 (Message Digest 5):
- Produces a 128-bit hash value.
- Fast but vulnerable to collisions (not secure for cryptography).
- Common use: File integrity checks.
- SHA (Secure Hash Algorithm):
- SHA-1: 160-bit output. Deprecated due to vulnerabilities.
- SHA-256: Secure 256-bit output, widely used in cryptography.
- SHA-512: Stronger version with a 512-bit output.
- CRC (Cyclic Redundancy Check):
- Used for error-checking in data transmission, not secure for cryptography.
- Bcrypt:
- Specially designed for password hashing.
- Introduces a salt to prevent attacks like rainbow table.
4. Applications of Hashing
- Data Integrity:
- Hashes ensure that data (files, messages) has not been tampered with.
- Example: Comparing file hashes during downloads.
- Digital Signatures:
- Used to verify the authenticity and integrity of messages.
- Password Storage:
- Passwords are hashed before storage to ensure security.
- Example: Login systems.
- Blockchain:
- Hashing links blocks together, ensuring immutability.
- Efficient Searching:
- Hashing is used in hash tables for fast data retrieval in databases.
5. Differences Between Hashing and Encryption
Feature | Hashing | Encryption |
---|---|---|
Purpose | Verify data integrity | Confidentiality of data |
Reversibility | Irreversible | Reversible with a key |
Output | Fixed-length digest | Ciphertext (variable length) |
Use Cases | Passwords, digital signatures, blockchain | Secure communication, file security |
6. Quick Recap Table
Algorithm | Output Size | Use Case | Security |
---|---|---|---|
MD5 | 128 bits | File integrity | Weak (collisions) |
SHA-1 | 160 bits | Legacy systems | Weak |
SHA-256 | 256 bits | Cryptography, blockchain | Strong |
Bcrypt | Varies | Password hashing | Strong |
CRC | Varies | Error detection | Not for security |
7. Mnemonics for Quick Memory
- SHA: Secure Hash Always – Reliable for security.
- MD5: Mostly Defunct 5 – Avoid for critical uses.
- Hashing Purpose: Think DIP – Data Integrity & Passwords.
3. Digital Certificates
1. What is a Digital Certificate?
- Definition: A digital certificate is an electronic document used to prove the ownership of a public key.
- Purpose:
- Verifies the identity of the certificate holder (individual, organization, or website).
- Facilitates secure communication by enabling encryption.
- Prevents man-in-the-middle attacks by confirming authenticity.
2. Key Components of a Digital Certificate
- Public Key:
- Used for encryption or verifying digital signatures.
- Certificate Holder Information:
- Name, email, organization, etc.
- Certificate Authority (CA):
- The trusted entity that issues the certificate.
- Serial Number:
- Unique identifier for the certificate.
- Expiration Date:
- Specifies the validity period.
- Signature:
- Issued by the CA to certify authenticity.
- Algorithms:
- Specifies encryption and hashing algorithms used.
3. How Does a Digital Certificate Work?
- A website or entity applies for a certificate from a Certificate Authority (CA).
- The CA verifies the applicant’s identity.
- Once verified, the CA issues the certificate containing the applicant’s public key.
- During secure communication:
- The receiver verifies the certificate by checking the CA’s digital signature.
- The public key is used for encrypting data or verifying messages.
4. Certificate Authorities (CAs)
- Trusted organizations that issue digital certificates.
- Examples of well-known CAs:
- DigiCert
- GoDaddy
- GlobalSign
- Let’s Encrypt
5. Types of Digital Certificates
- SSL/TLS Certificates:
- For securing websites.
- Types:
- Domain Validation (DV): Basic validation for domains.
- Organization Validation (OV): Validates the organization behind the domain.
- Extended Validation (EV): Provides the highest trust level with visible indicators like the green address bar.
- Code Signing Certificates:
- Authenticate software developers and ensure code integrity.
- Email Certificates (S/MIME):
- Secure email communication by encrypting messages.
- Client Certificates:
- Identify and authenticate individuals to servers.
6. Role of Digital Certificates in Public Key Infrastructure (PKI)
- PKI is a system for managing digital certificates and public keys.
- Components of PKI:
- Certificate Authority (CA): Issues and signs certificates.
- Registration Authority (RA): Verifies user identity.
- Certificate Revocation List (CRL): Lists revoked or invalid certificates.
7. Common Protocols and Standards
- X.509 Standard:
- Most widely used format for digital certificates.
- TLS/SSL Protocols:
- Use certificates for secure communication over the internet.
8. Revocation of Digital Certificates
- Certificates can be revoked if:
- The private key is compromised.
- The certificate holder’s information changes.
- The certificate is no longer trusted.
- Revocation Methods:
- CRL (Certificate Revocation List): A list of invalidated certificates.
- OCSP (Online Certificate Status Protocol): A real-time certificate status check.
9. Quick Recap Table
Term | Explanation |
---|---|
Digital Certificate | Electronic document proving ownership of a public key. |
Certificate Authority | Trusted entity issuing the certificate. |
Public Key | Used for encryption or signature verification. |
PKI | Framework for managing digital certificates and encryption. |
CRL | List of revoked certificates. |
10. Mnemonics for Quick Memory
- CA: Certificate Authenticator – Issues and verifies certificates.
- PKI: Public Key Infrastructure – Handles encryption and certificates.
- CRL: Cancelled Record List – Revoked certificates.
Quick Recap Table
Concept | Purpose | Example | Key Points |
---|---|---|---|
Encryption | Secures data by converting it to ciphertext | AES (Symmetric), RSA (Asymmetric) | Symmetric = fast; Asymmetric = secure key exchange. |
Hashing | Verifies integrity and stores passwords | MD5, SHA-256 | Fixed-length output, irreversible, collision-resistant. |
Digital Certificates | Validates identity in online communications | TLS/SSL Certificates | Issued by CA, used in HTTPS, digital signatures. |
Tips to Remember
- Encryption: Think of a lock and key (symmetric = 1 key, asymmetric = 2 keys).
- Hashing: Like a fingerprint—unique and irreversible.
- Digital Certificates: Like a passport—verifies identity.
MCQ
What is the main purpose of encryption?
A) Compression
B) Authentication
C) Confidentiality
D) Key exchange
Answer: C) Confidentiality
Which process converts ciphertext back into plaintext?
A) Hashing
B) Decryption
C) Encoding
D) Encryption
Answer: B) Decryption
Which of the following is not a characteristic of encryption?
A) Irreversibility
B) Confidentiality
C) Uses a key
D) Requires an algorithm
Answer: A) Irreversibility
Which encryption algorithm uses the same key for encryption and decryption?
A) RSA
B) AES
C) ECC
D) Diffie-Hellman
Answer: B) AES
What is the block size of AES encryption?
A) 64 bits
B) 128 bits
C) 192 bits
D) 256 bits
Answer: B) 128 bits
Which encryption algorithm is considered insecure due to its small key size?
A) RSA
B) DES
C) AES
D) SHA
Answer: B) DES
Which is an improvement over DES encryption?
A) SHA-256
B) 3DES
C) RSA
D) ECC
Answer: B) 3DES
In asymmetric encryption, the public key is used for:
A) Decryption
B) Key exchange
C) Encryption
D) Generating hash values
Answer: C) Encryption
Which of the following is an asymmetric encryption algorithm?
A) AES
B) 3DES
C) RSA
D) MD5
Answer: C) RSA
Elliptic Curve Cryptography (ECC) is primarily used for:
A) Large-scale data encryption
B) Key generation in resource-constrained environments
C) Replacing RSA in hashing
D) Secure hashing
Answer: B) Key generation in resource-constrained environments
Which problem is asymmetric encryption based on?
A) Factoring large prime numbers
B) Collision resistance of hashes
C) Symmetric key distribution
D) Reversible hashing
Answer: A) Factoring large prime numbers
In symmetric encryption, how is the key shared securely?
A) Through emails
B) Using asymmetric encryption
C) Hardcoding in software
D) None of the above
Answer: B) Using asymmetric encryption
What is the purpose of a digital certificate in encryption?
A) To verify the sender’s identity
B) To encrypt data
C) To generate hash values
D) To compress data
Answer: A) To verify the sender’s identity
The entity responsible for issuing digital certificates is called:
A) Private Key Generator
B) Certificate Authority (CA)
C) Public Key Distributor
D) Internet Protocol Manager
Answer: B) Certificate Authority (CA)
Which encryption method is commonly used in HTTPS?
A) DES
B) RSA
C) MD5
D) ECC
Answer: B) RSA
What kind of encryption does WPA2 use for securing Wi-Fi?
A) DES
B) AES
C) RSA
D) SHA-1
Answer: B) AES
Which encryption is typically used in email security protocols like PGP?
A) RSA
B) AES
C) SHA
D) 3DES
Answer: A) RSA
Which encryption technique is primarily used for large-scale data storage?
A) Symmetric Encryption
B) Asymmetric Encryption
C) Hashing
D) None of the above
Answer: A) Symmetric Encryption
Which encryption algorithm is the fastest?
A) DES
B) AES
C) RSA
D) ECC
Answer: B) AES
Which encryption ensures message integrity?
A) RSA
B) Hashing combined with encryption
C) DES
D) Key Exchange Protocols
Answer: B) Hashing combined with encryption
What is the key difference between encryption and hashing?
A) Hashing is reversible, encryption is not.
B) Hashing provides confidentiality, encryption provides integrity.
C) Hashing is irreversible, encryption is reversible with the right key.
D) Encryption generates fixed-length output, hashing does not.
Answer: C) Hashing is irreversible, encryption is reversible with the right key.
Hashing
What is hashing?
A) Process of encrypting data
B) Process of mapping data to a fixed size
C) Compressing data for storage
D) Process of converting data to binary format
Answer: B) Process of mapping data to a fixed size
The fixed-length output of a hash function is called:
A) Hash
B) Digest
C) Checksum
D) Both A and B
Answer: D) Both A and B
Which property makes hash functions suitable for data integrity?
A) Reversibility
B) Deterministic behavior
C) Collision resistance
D) Both B and C
Answer: D) Both B and C
Which of the following is a key application of hashing?
A) Sorting arrays
B) Data encryption
C) Storing passwords securely
D) Optimizing memory allocation
Answer: C) Storing passwords securely
In password management, hashing is used because:
A) It can be reversed to obtain the original password.
B) It allows secure storage of passwords without storing the plaintext.
C) It compresses data efficiently.
D) It requires less memory than encryption.
Answer: B) It allows secure storage of passwords without storing the plaintext
Which of these is NOT an application of hashing?
A) Intrusion detection
B) Virus detection
C) Key management
D) One-way password files
Answer: C) Key management
Which algorithm produces a 256-bit hash?
A) MD5
B) SHA-1
C) SHA-256
D) AES
Answer: C) SHA-256
MD5 hashing algorithm produces a hash of:
A) 128 bits
B) 160 bits
C) 256 bits
D) 512 bits
Answer: A) 128 bits
Which hash function is considered weak due to collision vulnerabilities?
A) MD5
B) SHA-256
C) SHA-3
D) Bcrypt
Answer: A) MD5
Which collision resolution technique uses linked lists?
A) Linear Probing
B) Quadratic Probing
C) Separate Chaining
D) Double Hashing
Answer: C) Separate Chaining
Linear probing resolves collisions by:
A) Using a secondary hash function
B) Placing the element in the next available slot
C) Chaining collided elements in a list
D) Clustering similar keys together
Answer: B) Placing the element in the next available slot
What is a drawback of linear probing?
A) Hash table overflow
B) Increased memory usage
C) Primary clustering
D) Data integrity issues
Answer: C) Primary clustering
A cryptographic hash function should satisfy which of the following?
A) Pre-image resistance
B) Second pre-image resistance
C) Collision resistance
D) All of the above
Answer: D) All of the above
Which property ensures that a hash function output cannot be predicted?
A) Determinism
B) Pre-image resistance
C) Avalanche effect
D) Collision resistance
Answer: C) Avalanche effect
Which hash function is widely used in blockchain technology?
A) MD5
B) SHA-256
C) Bcrypt
D) AES
Answer: B) SHA-256
Digital Certificates
What is the primary purpose of a digital certificate?
A. Encrypt data
B. Authenticate the sender of a message
C. Provide a secure channel for communication
D. Store passwords securely
B
Which organization is responsible for issuing digital certificates?
A. Certificate Authority (CA)
B. Internet Service Provider (ISP)
C. Domain Registrar
D. Network Administrator
A
Which standard format is commonly used for digital certificates?
A. RSA
B. PKCS
C. X.509
D. SHA-256
C
What is contained in a digital certificate?
A. Public key, certificate authority’s digital signature, and owner’s details
B. Private key and public key
C. Hash of the data and encryption key
D. Only the encryption algorithm details
A
What is the role of a private key in a Public Key Infrastructure (PKI)?
A. Encrypt data for transmission
B. Decrypt messages signed with the public key
C. Digitally sign messages for authentication
D. Generate session keys
C
Which of the following protocols uses digital certificates for establishing secure connections?
A. HTTPS
B. HTTP
C. FTP
D. SMTP
A
How can you verify the authenticity of a digital certificate?
A. By checking the issuing CA’s signature
B. By comparing the hash value
C. By using the private key
D. By validating through a symmetric encryption algorithm
A
What does the expiration date in a digital certificate signify?
A. The last date the certificate is valid for authentication
B. The renewal date for the public key
C. The date after which encryption keys are re-generated
D. The time to update the PKI settings
A
What does the term ‘Certificate Revocation List (CRL)’ refer to?
A. A list of expired certificates
B. A list of invalid certificates revoked by a CA
C. A list of trusted certificates
D. A list of self-signed certificates
B
What is the difference between a self-signed certificate and one issued by a CA?
A. Self-signed certificates do not require a public key
B. CA-issued certificates are universally trusted
C. Self-signed certificates are encrypted using DES
D. CA-issued certificates cannot be revoked
B
What is an important limitation of a digital certificate?
A. It can only be used for email security
B. It requires frequent manual renewal
C. It does not verify the legal identity of the certificate holder
D. It depends on the trustworthiness of the issuing CA
D
Which of these algorithms is most commonly used for creating a digital signature?
A. AES
B. RSA
C. SHA-256
D. DES
B
What type of key is embedded in a digital certificate?
A. Symmetric key
B. Asymmetric private key
C. Asymmetric public key
D. Session key
C
What happens if a certificate is revoked but the client doesn’t update its CRL?
A. The client can still trust the revoked certificate
B. The client automatically denies all certificates
C. The client prompts the user to update the CRL
D. The certificate gets auto-renewed
A