AKs Flashcards

1
Q

One evaluation criterion for electronic payment systems is traceability. Briefly explain its meaning! Describe the conflict of interest concerning customers and service providers!

A

The payment transfer allows to conclude who has used the money, what the money has been used for and where the money has been used.

Customers will be interested in anonymity,

while service providers will request traceability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name 4 other evaluation criteria for electronic payment systems!

A
  • System security,
  • transaction costs
  • online-checking requirements
  • acceptability
  • transferability
  • divisibility.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name a secure up-to-date hash algorithm which is currently used

A

Secure Hash Algorithm (SHA) - latest version is SHA-3

(known practical attacks on MD5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

strong collision resistance?

A

“two arbitrary byte sequences result in the same hash values with a probability of

2^(-x) = 1/y

y = Länge obere Schranke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name an advantage as well as a disadvantage of link state routing! Also state one routing protocol which uses link state routing.

A
  • Advantage: Routers can react fast to changes in network topology and does not have to deal with the count-to-infinity problem.
  • Disadvantage: Quite large overhead due to flooding.
  • Examples:
  • *OSPF** (Open Shortest Path First),
  • *IS-IS** (Intermediate System to Intermediate System Protocol).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two key quality measurements in information retrieval? Give a short defi- nition of each of them.

A
  • Recall: The ratio of relevant documents retrieved for a given query over the number of relevant documents for that query in a database. The highest value of recall is achieved when all relevant documents are retrieved.
  • Precision: The ratio of the number of relevant documents retrieved over the total number of documents retrieved. The highest value of precision is achieved when only relevant documents are retrieved.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To measure the similarity of words the Hamming distance and the Editing distance can be used. Give a short definition of each of them.

A
  • Hamming distance: Hamming distance gives the number of positions in the words with different characters.
  • Editing distance: The Editing distance gives the number of operations needed to transform a word into another. Possible operations are insertion, deletion and replace.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OFB (dis-)advantage

A

AD:

the necessary encryptions of the initial vector can be computed prior to the encryption of the plaintext!
1-bit flip of ciphertext affects single bit of plaintext only

DisAD:

Can not recover from loss of a block

Prone to attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The routing slgorithm OSPF is mainly used within autonomous systems, whereas EGP and BGP are used between autonomous systems.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Komplexität

A
  • In KMP: worst case is O(n)
  • BM: worst case is O(n*m), but average (& best) case is O(n/m).
  • Editing distance average: O(n^2)
  • Native approach average: O(n*m)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Triple DES is an enhanced stream chipger which applies the data Encryption Standard chipher algorithm three times to the data stream. It was deigned to overcome the weakness of DES.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

With Ecash, the issuing bank validates the coins by its value specific blind signature.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

count-to-infinity-problem sentence

A

just the indexed cectors with distances, but no corresponding links are being distributed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

flow control synonym

A

congestion-avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why flow control in TCP? Which other protocol not need these mecahnisms and why?

A
  • determine size of congestion window to avoid buffer overflow
  • trasmission starts with small amount of data
  • reliable data communication ca be realised
  • UPD, because for fast transmission of data without guranteeing the reliability of the data transmission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain the difference between authentication and authorisation.

other 2 requirements of secure communication

A
  • Authentication: correct identification of the sender of a message
  • Authorisation: function of specifying access rights to resources, e.g. file contents or transmission channels.
  • Confidentiality: process of transforming information (pt) using an algorithm (chipher) to make it unreadable to anyone except those possessing special knowledge usually reffered to as a key.
  • Integrity check: method to check wheather the data or data flow have been changed, e.g. with respect to sender, contetns ordering or time stamps
17
Q

abbreviation DES stand for?

symmetric or asymmetric method

main problem with these kinds of cryptographic methods

A
  • Data Encryption Standard
  • symmetric
  • all symmetric methods require O(n^2) keys for a secure communication between n persons and the transmission of keys has to be done with highest security
18
Q

hybrid cryptosystem works

benefits compared to using only one category of cryptosystems

examples

A
  • uses benefits of both symmetric and asymmetric methods
  • symmetric like AES to generate a session key faster than asymmetric
  • asymmetric like RSA to exchange private and public keys with higher security
  • basically: big messages -> symmetric
  • small data amount -> asymmetric
19
Q

Crypto Methods

A
20
Q

3 characteristics from FNCs (Federal Networking Council) definition of global information system “Internet”

A
  • logically linked together by a globally unique address space based on IP
  • communication using TCP/IP
  • provides, uses or makes accessible high level services layered on the communications and related infrastructure described herein
21
Q

Hierarchical routing may lead to longer “shortest paths” than flat routing.

A

TRUE

22
Q

reasonable use case for hash algo

A

SSL certificates or digital signatures

23
Q

C1 = AES128(M),

C2=RSA128(M)

encypt via burte-force

A

attack C2 because there are only a fraction of possible keys which mathematically work.

dont have to try all keys like in AES

24
Q

one and only verifiable method of encrypting a message so that no other person except the intended receiver will ever be able to decrypt the messyge? Which resitrictions must be followed?

A

One-time pad

key has to be truly random,

as alrge as or greater than the plaintext,

never reused in whole or part and

kept secret.

(impossible to decrypt without knowing the key)

25
Q

The S-box provides the ccore of the security of the Data Encryption Standard. Why?

A

Without them, the cipher would be linear, and trivially breakably by differential cryptanalysis.

26
Q

What are the three different levels of Electronic Payment Systems?

A
  • Fist level (two party stored-value system): Client may buy at the emitter only.
  • Second level (three-party stored-value system): Client may buy at other places/shops as well.
  • Third level (open-loop stored-value system): Currency-like “open-loop” system: electronic money may circulate freely through several transactions.
27
Q

slow start & flow control

A
  • slow start to prevent overloading the network
  • window size (in TCP header) based on the buffer size of the receiver
  • capacity of the network as well: congestion window (CWnd)
  • In detail: 1MSS sent -> doubled if acknowledged
  • until timeout or windowsize is reached
  • threshold = CWnd/2 whenever timer expires
  • threshld is reached -> increase CWnd linear not exponentially like before