Blown to Bits: Chapter 5

1. What is encryption?
Encryption is the process of encoding a message with a secret key so that it can not
be deciphered by anyone else except the one receiving the message.
2. What is cryptography? Provide an example.
Cryptography is when the sender and receiver are the only ones that can understand
the message. An example of cryptography is morse code. Only those who knows
morse code will be able to understand.
3. What is security through obscurity and why is it bad?
Security through obscurity is the practice of creating encryption and keeping the code
private. The idea is bad because if the encryption is found out, the secret information
is not safe.
4. What is the key agreement protocol and why is it so important to Internet
commerce?
The key agreement protocol is a system in which two different parties can create a
key together without an eavesdropper figuring out the key.  This is important because
without being able to share your key with the other person in private, all your messages
are at risk of being decrypted by an eavesdropper.
5. What is a certificate and what role does it play in Internet security?
A certificate is a trusted signature of a person who is trying to communicate online.The
role is to check to see if the person who is communicating is that person and not
someone else.

Free Response:
6. In your opinion, are digital signatures more secure than handwritten
signatures? Explain.
In my opinion, digital signatures are more secure than handwritten signatures because
it is more safe than the handwritten ones. Handwritten signature can be copied if someone
gets a hold of it but digital signature has many safeguards to protect it.

Comments

Popular posts from this blog

Blown to Bits: Chapter 4

Blown to Bits: Chapter 1