Protecting data integrity - Explain the special security and integrity problems which
can arise during online updating of files
These video aims to remind you of the different security risks there are to data. Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle.
Data security includes data encryption, hashing, tokenization, and key management practices that protect data across all applications and platforms.
Integrity of data refers to the accuracy and consistency of data stored in a database, data warehouse, data mart or other construct.
This is important as it guarantees and secures the searchability and traceability of your data to its original source.
Maintaining data integrity requires an understanding of the two types of data integrity: physical integrity and logical integrity.
Cryptography - Describe the need for and the purpose of cryptography.
Cryptography - Describe techniques of cryptography and their role in protecting data.
Cryptography - Follow algorithms and programs used in cryptography.
Cryptography - Compare cryptographic methods and their relative strength.
This video aims to discuss the need, use and techniques of cryptography.
This video was produced by Crash Course Computing - look them up on youtube; they have lots of videos useful at Alevel.
What is meant by a good cipher?
amount of secrecy should determine the amount of work needed to encrypt and decrypt
the cipher must work on all types of data
the algorithm should be simple to minimise implementation errors
If an error is introduced it should not impact the rest of the message
the size of the cipher text should be no larger than the original plain text
The strength of an encryption algorithm relies on the the key rather than the process of the cipher. The goal of the attack therefore focuses on trying to work out the key usually via brute-force which tries every combination to find match. An alternative is statistical analysis: if certain groups of characters appear more often than others in the cipher text then the frequencies can be compared with the frequencies of certain groups pf characters in plain English.
When looking at the strength of an encryption algorithm, it is important that is adds diffusion. Diffusion will ensure that each letter of plain text will impact more than one letter in the cipher text. By combining different letters together in different ways you limit the predictability of the resultant cipher. This can be combined with random data to further gaurd against frequency or dictionary attacks. By using Exclusive OR (XOR) and a random seed, a stream of random data can be created. This operation can be undone by the destination if it knows the random seed, as the values produced by any random number generator will be the same if the seed is the same. This process is know as salting.
The strength of the key will depend on how vulnerable the cipher text is to a brute-force attack. Small keys, which are under 56 bits, can be broken by modern computers in a few day. However larger keys, 128-bit or above, would take millions of years to break brute-force.
Past Paper questions walk through
Symmetric Encryption (encrypted and decrypted using same key)
Asymmetric Encryption (encrypted using public key, decrypted using private key
What is the need for and purpose of cryptography?
Describe techniques of cryptography and their role in protecting data
Compare cryptographic methods and their relative strength
This video attempts to describe how an asymmetric encryption algorithm works. Focus on the bits which show how the public and private keys are developed and used (in the middle of the video).
Here is a past paper question which combines your theory knowledge of Cryptography with your ability to apply XOR encryption to a message (in binary).
WJEC 2017
Looking at 8(b) in a bit more detail:
Original Message = O K ! (ASCII characters)
0100 1111 0100 1011 0010 0001 (convert to binary equivalent)
XOR Key 1111 0011 1111 0011 1111 0011 (XOR key repeated for each character in message)
XOR the two lines above together:
Encrypted string 1011 1100 1011 1000 1101 0010 ** This answer gets you the 3 marks for Qu 8(b) **
------------------------------------------------------------------------------------------------------------------------
Note: this is an example of symmetric encryption, where the same key is used to encrypt and decrypt the message. If you take the encrypted string and reapply XOR using the same key (1111 0011), you will get the original message, as follows:
Encrypted string 1011 1100 1011 1000 1101 0010
XOR Key 1111 0011 1111 0011 1111 0011
0100 1111 0100 1011 0010 0001
O K ! = Original Message
Biometrics - Describe the purpose and use of contemporary biometric technologies..
Biometrics - Describe the benefits and drawbacks of biometric technologies.
Biometrics - Describe the complexities of capturing, storing and processing biometric data.
This video aims to take you through what are biometrics, how they work and what the benefits and drawback are.
Malicious software and mechanisms of attack and defence - Describe types and mechanisms of malicious software and their vectors.
Malicious software and mechanisms of attack and defence - Describe black hat hacking, white hat hacking and penetration testing.
This video gives you good background information
This video goes into detail about the three purposes to hacking.
Julian Assange, the man behind Wikileaks, says he’s the victim of a US conspiracy to punish him for exposing alleged US war crimes.