Alles Flashcards
Differentiate “Safety” und “Security”
Safety: Defense against non-deliberate threats.
Security: Defense against deliberate threats.
Gib Beispiele für “Safety”
Hardware malfunction, software bugs, erroneous user input, power loss, .
Gib Beispiele für “Security”
Hardware manipulation, software manipulation, malicious user, physical attack
Bringe Asset, Threat und Attacks in Einklang
Assets
Something we want to protect in respect to certain principles.
Threat
Something challenging the protection of an asset.
Attack
An (attempt to) realize a threat.
Was sind die Prinzipien der Sicherheit? (Security Triangle)
Confidentiality - Vertraulichkeit (Third parties do not get to know data.)
Integrity - Integrität (Third parties cannot manipulate data.
Availability - Verfügbarkeit (Third parties cannot prevent legitimate parties from using data.)
Was sollte bei der Nutzung von Kryptographie beachtet werden?
Do not invent cryptography!
Use standards!
Do not implement cryptography!
Use libraries!
How many rounds do AES, DES, GOST?
AES 10-14
DES 16
GOST 32
Was ist einer der Vorteile von AES?
Ist in modernen CPUS eingebaut und damit schnell
Charakterisiere AES
Blocksize: 128 bit
Keysize: 128, 192 or 256 bit
Rounds: 10, 12 or 14
Welche drei Splits bzgl. Verschllüsselungen gibt es?
ECB - Electronic Code Block
CBC - Cipher Block Chaining
CTR - Counter Mode
Erkläre ECB
Split message in blocks of 128 bit each. Encode each block separately.
–> Ganz simple: Plain —-Verschlüsselung—> Cipher
Was ist das Problem an ECB?
Identical 128 bit plain text block are encrypted to identical cipher text block.
=> Structures in plain text are preserved in cipher text!
Beispiel Pinguinbild
Erkläre CBC
Xor plain text block with cipher text of previous block.
Plain – Xor mit Initialization Vector oder cipher text of previous block – Verschlüsselung –> Cipher
Erkläre CTR
This key stream is xored with the plain text of the message, like using a one-time pad.
CTR — Verschlüsselung –> Xor mit Plain –> Cipher
Was sind die Vorteile von CTR gegenüber CBC? Was ist der Nachteil von CTR?
Bit errors in ciphertext only affect the corresponding plain text bits.
Each block can be en-/decrypted independent of each other block.
Less information leakage
CTR mode does not require padding – just encrypt your message and throw away the rest of your key stream.)
Nachteil: The same counter value must never be used more than once with each key.
Was ist eine Herausforderung bei Block Ciphers (Länge) und wie wird dies gelöst?
Block ciphers require message length to be a multiple of the block length.
Welche beiden Arten der Random Number Generators gibt es?
Pseudo Random Number Generators (PRNG)
True Random Number Generators (TRNG)
Für was sind Random Number Generators wichtig?
- Start value of counter in CTR mode.
* Initialization vector in CBC mode.
Wie funktioniert einfacher Integritätssicherheit?
Hashing:
• He gets the file and a hash value of the file.
• He re-calculates the hash.
• If both hash values are the same, the file has not been manipulated.
Was ist das Problem beim einfachen Hashing?
What if Mallory changes the file and the hash?
Was ist Message Authentication Code? (MAC)
A cryptographic checksum is called a Message Authentication Codes (MAC).
Wie funktioniert Message Authentication Code? (MAC)?
Instead of calculating h(M) calculate h(K||M)
A secret is incorporated into the calculation of the hash.
Only Alice and Bob now the secret.
Secret required to calculate the hash
Mallory does not know the secret.
=> Only Alice and Bob can calculate and verify checksum.
Was ist Preimage Resistance?
Given hash value h(M), it is impossible to learn anything about M.
–> Finde zu einem Geburtstag eine Person, die dann Geburtstag hat
Was ist Second preimage Resistance?
Given a message M, it is impossible to find a message M′ such that h(M) = h(M′)
Finde zu einer bestimmten! Person eine zweite Person, die am gleichen Geburtstag hat
Was ist Collision Resistance?
It is impossible to find message M and M′ with
h(M) = h(M′)
Implizit aus Second preimage Resistance: Finde überhaupt zwei Personen, die am gleichen Tag Geburtstag haben
Wieso reicht MAC allein nicht aus?
Since the attacker knows h(K||M), she can append data to the message and calculate the corresponding MAC without knowing the key!