{"id":123,"date":"2022-05-17T16:01:25","date_gmt":"2022-05-17T15:01:25","guid":{"rendered":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/?page_id=123"},"modified":"2022-05-17T16:07:20","modified_gmt":"2022-05-17T15:07:20","slug":"security-precautions","status":"publish","type":"page","link":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/security-precautions\/","title":{"rendered":"Security Precautions"},"content":{"rendered":"<h2 style=\"color: red\">Encryption<\/h2>\n<p><span data-contrast=\"auto\">With so much information being transmitted electronically, it is essential that the information be transferred safely and securely.\u00a0 One of the methods of doing this is to use encryption.\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Public &amp; Private Key Encryption (Asymmetric Encryption)<\/span><\/b><\/p>\n<p><span data-contrast=\"auto\">Public &amp; Private key encryption (sometimes called asymmetric encryption) involves generating two keys, a public key and a private key. Both keys are mathematically linked using very large prime numbers. Both keys work as a pair.<\/span><\/p>\n<ul>\n<li data-aria-posinset=\"1\" data-aria-level=\"2\"><b>Public Key<\/b><br \/>\n<span data-contrast=\"auto\">The public key can be distributed to anyone who wishes to send you a message and they use this public key to encrypt the data.\u00a0\u00a0<\/span><span data-contrast=\"auto\">The public key can also decrypt data that has been encrypted with the private key.\u00a0<\/span><\/li>\n<li data-aria-posinset=\"2\" data-aria-level=\"2\"><b>Private Key<\/b><br \/>\n<span data-contrast=\"auto\">The private key is known only by you only this private key can be used to decrypt data created by the corresponding public key.\u00a0<\/span><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-124 aligncenter\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phshighercomputingscience\/uploads\/sites\/10042\/2022\/05\/17155949\/GetImage-14-300x182.png\" alt=\"\" width=\"511\" height=\"310\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phshighercomputingscience\/uploads\/sites\/10042\/2022\/05\/17155949\/GetImage-14-300x182.png 300w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phshighercomputingscience\/uploads\/sites\/10042\/2022\/05\/17155949\/GetImage-14-768x466.png 768w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phshighercomputingscience\/uploads\/sites\/10042\/2022\/05\/17155949\/GetImage-14-624x379.png 624w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phshighercomputingscience\/uploads\/sites\/10042\/2022\/05\/17155949\/GetImage-14.png 1011w\" sizes=\"auto, (max-width: 511px) 100vw, 511px\" \/><\/p>\n<p><span data-contrast=\"auto\">In the example above, Bob wishes to send Alice an encrypted message.\u00a0 Alice sends Bob her public key which he uses to encrypt the message.\u00a0 He then sends the encrypted message to Alice who uses her private key to decrypt the message.<\/span><\/p>\n<p><span data-contrast=\"auto\">If Alice wished to reply, then she could encrypt the message with her private key and send it to Bob who can decrypt it with her public key<\/span><span data-contrast=\"auto\">.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Secure Socket Layer (SSL)<\/span><\/b><span data-contrast=\"auto\">\u00a0is a popular encryption system for secure websites.\u00a0 It operates by:\u00a0<\/span><\/p>\n<ol style=\"font-weight: 400\">\n<li data-aria-posinset=\"1\" data-aria-level=\"2\"><span data-contrast=\"auto\">Your browser will be sent the website&#8217;s public key &#8211; the private key remains on the website\u2019s server, so is still secure and cannot be intercepted.<\/span><\/li>\n<li data-aria-posinset=\"2\" data-aria-level=\"2\"><span data-contrast=\"auto\">Your browser, uses the public key to encrypt the data you are sending (for example your credit card details)<\/span><\/li>\n<li data-aria-posinset=\"3\" data-aria-level=\"2\"><span data-contrast=\"auto\">The data is sent back to the server &#8211; even if someone has intercepted the public key and your message they still cannot decrypt the message as they do not have the private key.<\/span><\/li>\n<li data-aria-posinset=\"4\" data-aria-level=\"2\"><span data-contrast=\"auto\">Once back at the server, the private key is used to decrypt the message.<\/span><\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-125 aligncenter\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phshighercomputingscience\/uploads\/sites\/10042\/2022\/05\/17160116\/GetImage-15-300x177.png\" alt=\"\" width=\"554\" height=\"327\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phshighercomputingscience\/uploads\/sites\/10042\/2022\/05\/17160116\/GetImage-15-300x177.png 300w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phshighercomputingscience\/uploads\/sites\/10042\/2022\/05\/17160116\/GetImage-15.png 559w\" sizes=\"auto, (max-width: 554px) 100vw, 554px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"color: red\">Digital Signature<\/h2>\n<p><span data-contrast=\"auto\">The purpose of a digital signature is to authenticate the identity of the sender and ensure that the content has not been modified en route.\u00a0\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Digital signature are very difficult to forge and can automatically include a date and time.\u00a0 Digital signatures can be used as legal evidence that the message came from the person sending it and it has not been modified.<\/span><\/p>\n<p><span data-contrast=\"auto\">A digital signature is created by:<\/span><\/p>\n<ol>\n<li data-aria-posinset=\"1\" data-aria-level=\"2\"><span data-contrast=\"auto\">A mathematical value (called the hash total) is calculated from the unencrypted data.\u00a0 Because the hash total is calculated from the original message even the slightest change to the message would produce a different hash total.\u00a0\u00a0<\/span><\/li>\n<li data-aria-posinset=\"2\" data-aria-level=\"2\"><span data-contrast=\"auto\">The sender of the message encrypts the hash total using their private key and this encrypted total becomes the digital signature.<\/span><\/li>\n<li data-aria-posinset=\"3\" data-aria-level=\"2\"><span data-contrast=\"auto\">The digital signature is added to the message and the entire message (message + digital signature) is encrypted using the recipient\u2019s public key then sent to the recipient.<\/span><\/li>\n<li data-aria-posinset=\"4\" data-aria-level=\"2\"><span data-contrast=\"auto\">The recipient decrypts the message using their private key and decrypts the digital signature using the sender\u2019s public key.<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">The hash total is th<\/span><span style=\"font-size: 1rem\">en recalculated on the message and if it is the same as the total in the digital signature then the recipient can be sure that the message is from the identified sender and has not been modified in any way during transmission.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-128 aligncenter\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phshighercomputingscience\/uploads\/sites\/10042\/2022\/05\/17160425\/GetImage-16-300x225.png\" alt=\"\" width=\"519\" height=\"389\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phshighercomputingscience\/uploads\/sites\/10042\/2022\/05\/17160425\/GetImage-16-300x225.png 300w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phshighercomputingscience\/uploads\/sites\/10042\/2022\/05\/17160425\/GetImage-16.png 485w\" sizes=\"auto, (max-width: 519px) 100vw, 519px\" \/><\/p>\n<h2 style=\"color: red\">Digital Certificate<\/h2>\n<p><span data-contrast=\"auto\">Hoax digital signatures can be created using a fake private key claiming to be that of a trusted individual.\u00a0 To get around this, a digital certificate verifies that a sender\u2019s public key is formally registered to that particular sender.<\/span><\/p>\n<p><span data-contrast=\"auto\">Digital certificates are issued by certificate authorities such as Verisign or Symantec.\u00a0 This certificate allows the holder to use the Public Key Infrastructure (PKI).<\/span><\/p>\n<p><span data-contrast=\"auto\">The digital certificate contains\u00a0<\/span><\/p>\n<ul>\n<li data-aria-posinset=\"1\" data-aria-level=\"2\"><span data-contrast=\"auto\">The certificate serial number<\/span><\/li>\n<li data-aria-posinset=\"2\" data-aria-level=\"2\"><span data-contrast=\"auto\">The expiry date<\/span><\/li>\n<li data-aria-posinset=\"3\" data-aria-level=\"2\"><span data-contrast=\"auto\">The name of the holder<\/span><\/li>\n<li data-aria-posinset=\"4\" data-aria-level=\"2\"><span data-contrast=\"auto\">A copy of their public key<\/span><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-129 aligncenter\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phshighercomputingscience\/uploads\/sites\/10042\/2022\/05\/17160508\/GetImage-17-300x259.png\" alt=\"\" width=\"489\" height=\"422\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phshighercomputingscience\/uploads\/sites\/10042\/2022\/05\/17160508\/GetImage-17-300x259.png 300w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phshighercomputingscience\/uploads\/sites\/10042\/2022\/05\/17160508\/GetImage-17.png 332w\" sizes=\"auto, (max-width: 489px) 100vw, 489px\" \/><\/p>\n<p><b><span data-contrast=\"auto\">Applying for a Digital Certificate<\/span><\/b><\/p>\n<p><span data-contrast=\"auto\">In order to obtain a digital certificate:<\/span><\/p>\n<ol>\n<li data-aria-posinset=\"1\" data-aria-level=\"2\"><span data-contrast=\"auto\">In order to obtain a digital certificate, for the first time, the applicant sends a request to the registration authority along with proof of their identity e.g. driving licence, business document etc.\u00a0\u00a0 The registration authority verifies the applicant\u2019s identity and if satisfied then requests a digital certificate from the certificate agency on behalf of the applicant.<\/span><\/li>\n<li data-aria-posinset=\"2\" data-aria-level=\"2\"><span data-contrast=\"auto\">The certificate authority creates the digital certificate using the applicant\u2019s public key and other identity information.\u00a0<\/span><\/li>\n<\/ol>\n<p><span class=\"TextRun SCXO89731594 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXO89731594 BCX8\">The certificate authority signs the certificate with its own private key in order to ensure the authenticity, integrity and non-repudiation of the digital certificate. Finally, the certificate authority sends back the certificate to the applicant, which can be used to establish secure communication.<\/span><\/span><span class=\"EOP SCXO89731594 BCX8\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Using a Digital Certificate<\/span><\/b><\/p>\n<p><span data-contrast=\"auto\">Using the previous process, User B has applied for and being granted a digital certificate.\u00a0 User A wishes to communicate securely with User B:<\/span><\/p>\n<ol>\n<li data-aria-posinset=\"1\" data-aria-level=\"2\"><span data-contrast=\"auto\">User A sends a request for user B\u2019s digital certificate to a certificate repository which is part of the certificate authority.<\/span><\/li>\n<li data-aria-posinset=\"2\" data-aria-level=\"2\"><span data-contrast=\"auto\">When User A receives user B\u2019s certificate it verifies it with the help of web browser by checking the digital signature of the certificate authority using its public key.\u00a0 Then user A uses user B\u2019s public key supplied by the certificate to encrypt the message.<\/span><\/li>\n<li data-aria-posinset=\"3\" data-aria-level=\"2\"><span data-contrast=\"auto\">When user B receives the encrypted message, it uses its own private key to decrypt the message.<\/span><\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-130 aligncenter\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phshighercomputingscience\/uploads\/sites\/10042\/2022\/05\/17160621\/GetImage-18-300x261.png\" alt=\"\" width=\"557\" height=\"485\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phshighercomputingscience\/uploads\/sites\/10042\/2022\/05\/17160621\/GetImage-18-300x261.png 300w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/phshighercomputingscience\/uploads\/sites\/10042\/2022\/05\/17160621\/GetImage-18.png 426w\" sizes=\"auto, (max-width: 557px) 100vw, 557px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Encryption With so much information being transmitted electronically, it is essential that the information be transferred safely and securely.\u00a0 One of the methods of doing this is to use encryption.\u00a0 Public &amp; Private Key Encryption (Asymmetric Encryption) Public &amp; Private key encryption (sometimes called asymmetric encryption) involves generating two keys, a public key and a [&hellip;]<\/p>\n","protected":false},"author":79984,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-123","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/wp-json\/wp\/v2\/pages\/123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/wp-json\/wp\/v2\/users\/79984"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":4,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":132,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/wp-json\/wp\/v2\/pages\/123\/revisions\/132"}],"wp:attachment":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/phshighercomputingscience\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}