Basics Flashcards
Passive setting/attack
unauthorised access to data
Active attack
unauthorised alteration, deletion, transmission, access prevention
Security services
confidentiality
data integrity
data origin authentication
entity authentication
non-repudiation
(C) Confidentiality
assurance data cannot be viewed by an unauthorised viewer
(DI) Data integrity
assurance that data hasn’t been altered in an unauthorised manner (detection)
(DOA) Data origin authentication
assurance that given entity was the original source of data
(EA) Entity authentication
assurance that a given entity is involved and currently active in a session
(~identification - who am I communicating with?)
(NR) Non-repudiation
assurance that an entity cannot deny its commitment or action (to a third party)
Relationships b/w services
DOA > DI (DOA requires DI)
NR > DOA (NR requires DOA)
DOA =/= EA
DOA + Freshness = EA
C =/> DOA
DOA > DI (DOA requires DI)
If data was altered, receiver cannot be sure the source is who it claims to be
NR > DOA (NR requires DOA)
If the source denies its action, we can challange this claim only if we are sure that the action was performed by the source
DOA =/= EA
DOA - emails
EA - systems
DOA + Freshness = EA
DOA - certifies the sources is who it claims to be
Freshness - certifies the source is present at the moment of communication
C =/> DOA
a hacker can violate DI without breaking encryption
Cryptography
design and analysis of mechanisms that provide security services based using mathematical thechniques
Cryptographic primitive
cryptographic process that provides a number of specified security services
Cryptographic algorithm
specification of a cryptographic primitive
Cryptographic protocol
sequence of message exchanges and operations between parties aimed at achieving a security goal
Cryptosystem
implementation of primitives and accompanying infrastructure
Plaintext
raw data to be transmitted