Security Precautions | Higher Computing Science (2024)

Encryption

With so much information being transmitted electronically, it is essential that the information be transferred safely and securely. One of the methods of doing this is to use encryption.

Public & Private Key Encryption (Asymmetric Encryption)

Public & Private key encryption (sometimes called asymmetric encryption) involves generating two keys, a public key and a private key. Both keys are mathematically linked using very large prime numbers. Both keys work as a pair.

  • Public Key
    The public key can be distributed to anyone who wishes to send you a message and they use this public key to encrypt the data.The public key can also decrypt data that has been encrypted with the private key.
  • Private Key
    The private key is known only by you only this private key can be used to decrypt data created by the corresponding public key.

Security Precautions | Higher Computing Science (1)

In the example above, Bob wishes to send Alice an encrypted message. Alice sends Bob her public key which he uses to encrypt the message. He then sends the encrypted message to Alice who uses her private key to decrypt the message.

If Alice wished to reply, then she could encrypt the message with her private key and send it to Bob who can decrypt it with her public key.

Secure Socket Layer (SSL)is a popular encryption system for secure websites. It operates by:

  1. Your browser will be sent the website’s public key – the private key remains on the website’s server, so is still secure and cannot be intercepted.
  2. Your browser, uses the public key to encrypt the data you are sending (for example your credit card details)
  3. The data is sent back to the server – even if someone has intercepted the public key and your message they still cannot decrypt the message as they do not have the private key.
  4. Once back at the server, the private key is used to decrypt the message.

Security Precautions | Higher Computing Science (2)

Digital Signature

The purpose of a digital signature is to authenticate the identity of the sender and ensure that the content has not been modified en route.

Digital signature are very difficult to forge and can automatically include a date and time. Digital signatures can be used as legal evidence that the message came from the person sending it and it has not been modified.

A digital signature is created by:

  1. A mathematical value (called the hash total) is calculated from the unencrypted data. Because the hash total is calculated from the original message even the slightest change to the message would produce a different hash total.
  2. The sender of the message encrypts the hash total using their private key and this encrypted total becomes the digital signature.
  3. The digital signature is added to the message and the entire message (message + digital signature) is encrypted using the recipient’s public key then sent to the recipient.
  4. The recipient decrypts the message using their private key and decrypts the digital signature using the sender’s public key.

The hash total is then recalculated on the message and if it is the same as the total in the digital signature then the recipient can be sure that the message is from the identified sender and has not been modified in any way during transmission.

Security Precautions | Higher Computing Science (3)

Digital Certificate

Hoax digital signatures can be created using a fake private key claiming to be that of a trusted individual. To get around this, a digital certificate verifies that a sender’s public key is formally registered to that particular sender.

Digital certificates are issued by certificate authorities such as Verisign or Symantec. This certificate allows the holder to use the Public Key Infrastructure (PKI).

The digital certificate contains

  • The certificate serial number
  • The expiry date
  • The name of the holder
  • A copy of their public key

Security Precautions | Higher Computing Science (4)

Applying for a Digital Certificate

In order to obtain a digital certificate:

  1. In order to obtain a digital certificate, for the first time, the applicant sends a request to the registration authority along with proof of their identity e.g. driving licence, business document etc. The registration authority verifies the applicant’s identity and if satisfied then requests a digital certificate from the certificate agency on behalf of the applicant.
  2. The certificate authority creates the digital certificate using the applicant’s public key and other identity information.

The certificate authority signs the certificate with its own private key in order to ensure the authenticity, integrity and non-repudiation of the digital certificate. Finally, the certificate authority sends back the certificate to the applicant, which can be used to establish secure communication.

Using a Digital Certificate

Using the previous process, User B has applied for and being granted a digital certificate. User A wishes to communicate securely with User B:

  1. User A sends a request for user B’s digital certificate to a certificate repository which is part of the certificate authority.
  2. When User A receives user B’s certificate it verifies it with the help of web browser by checking the digital signature of the certificate authority using its public key. Then user A uses user B’s public key supplied by the certificate to encrypt the message.
  3. When user B receives the encrypted message, it uses its own private key to decrypt the message.

Security Precautions | Higher Computing Science (5)

Security Precautions | Higher Computing Science (2024)
Top Articles
What is market cap and how do you calculate it? | Fidelity
TikTok Analytics Defined For Brands & Marketers | Statusbrew
Overton Funeral Home Waterloo Iowa
Www.craigslist Virginia
Mopaga Game
Here are all the MTV VMA winners, even the awards they announced during the ads
Strange World Showtimes Near Cmx Downtown At The Gardens 16
Select Truck Greensboro
123Moviescloud
2024 Non-Homestead Millage - Clarkston Community Schools
Calmspirits Clapper
Dutchess Cleaners Boardman Ohio
Hoe kom ik bij mijn medische gegevens van de huisarts? - HKN Huisartsen
Fear And Hunger 2 Irrational Obelisk
272482061
Letter F Logos - 178+ Best Letter F Logo Ideas. Free Letter F Logo Maker. | 99designs
Sport-News heute – Schweiz & International | aktuell im Ticker
Urban Dictionary: hungolomghononoloughongous
Nhl Wikia
Commodore Beach Club Live Cam
Der Megatrend Urbanisierung
Nurse Logic 2.0 Testing And Remediation Advanced Test
Rural King Credit Card Minimum Credit Score
Rimworld Prison Break
Egizi Funeral Home Turnersville Nj
Sec Baseball Tournament Score
Target Minute Clinic Hours
Getmnapp
Meet the Characters of Disney’s ‘Moana’
Catchvideo Chrome Extension
Jailfunds Send Message
Craftybase Coupon
Possum Exam Fallout 76
Rek Funerals
Mawal Gameroom Download
Wheeling Matinee Results
Craigslist/Phx
Memberweb Bw
Blackstone Launchpad Ucf
Tal 3L Zeus Replacement Lid
Henry County Illuminate
Cbs Fantasy Mlb
Felix Mallard Lpsg
Mytime Maple Grove Hospital
Jamesbonchai
Natasha Tosini Bikini
Watch Chainsaw Man English Sub/Dub online Free on HiAnime.to
Greatpeople.me Login Schedule
Barback Salary in 2024: Comprehensive Guide | OysterLink
Urban Airship Acquires Accengage, Extending Its Worldwide Leadership With Unmatched Presence Across Europe
Buildapc Deals
Ubg98.Github.io Unblocked
Latest Posts
Article information

Author: Duane Harber

Last Updated:

Views: 6381

Rating: 4 / 5 (51 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Duane Harber

Birthday: 1999-10-17

Address: Apt. 404 9899 Magnolia Roads, Port Royceville, ID 78186

Phone: +186911129794335

Job: Human Hospitality Planner

Hobby: Listening to music, Orienteering, Knapping, Dance, Mountain biking, Fishing, Pottery

Introduction: My name is Duane Harber, I am a modern, clever, handsome, fair, agreeable, inexpensive, beautiful person who loves writing and wants to share my knowledge and understanding with you.