Bis Ende Flashcards

1
Q

TRIE

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Unterscheid PATRICIA und PAT-tree

A

PAT-Trees preprocess a text for searching patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sisstring

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Page Rank

A
  • between 0 and 1
  • likelihood to be visited by a person randomly surfing the web an following links
  • Weight x
  • 1/N: probability to visit A when being selected randomly out of all documents
  • sum of ranks of all documents which link to A, divided by their number of outgoing links
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Page Rank ausrechnen

A

putting the ranks of the latest iteration into the formula until the values converge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Encryption Standard

A
  • 64 bit key in 54 by ignoring every 8th bit
  • permutation table: alt in Tabelle -> neue Postition in Tabelle
  • round keys: dividing 54 into 28 bit halves and left shifting in q cyclic way
  • different bits of the key are used in each of the 16 rounds of the DES, which is one of the strengths of this algorithm
  • number of weak keys however is quite small (about 64)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hexadecimal

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DES

S-box

A
  • nonlinear
  • safety of DES
  • each S-box is a 4x16 table
  • In DES there are 8 fixed S-Boxes
  • S-box reduces the amount of bits Input: 6 bits -> output: 4 bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

S-box nonlinear Beweis

A
    1. und letzte = Zeile
  • dazwischen = Spalte
  • bei 0 anfangen zu zählen

linearity would allow for attacks with easy linear algebra.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RSA

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain how a search engine would proceed in order to return the relevant documents for our query and write down the mathematical formulas.

A
  • eliminate all documents which do not contain any of the query terms
  • number of times each query term occurs in each document, the so-called term frequency tfij (with i being the term and j being the document)
  • inverse document frequency factor idfi: weight of terms that occur very frequently in the collection and increases the weight of terms that occur rarely.
  • dividing the number of all documents (here: n) by the number of documents containing the term (document frequency dfi)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Take into consideration that some documents might be (a lot) larger than others. What problem might occur regarding our query terms and how can we prevent this problem.

A
  • we need to normalize this count in order to prevent a bias towards longer documents to give a measure of the importance
  • Nenner: to the maximum term frequency of any term occurring in the document dj
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What could you do in order to improve the relevance of one of your documents? Which actions are considered manipulation?

A

search engine optimization (SEO)

on-/off-page factors

punish manipulations by giving the document a low relevance

  • Term-/Keyword-frequency: use certain keywords very often (clever writing or spamming/doorway page)
  • Link structure: Documents linking to your document improve its rating (link farms)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

cryptology

  • Confusion
  • Diffusion
  • One-Time Pad
A
  • obscures the relationship between plaintext and ciphertext characters (e.g. substitution)
  • dissipates the redundancy of the plaintext (e.g. permutation); diffusion alone is easily cracked
  • only provably safe encryption technique: random key of the same length as the plaintext is generated and only used once
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the requirements for a public key cryptosystem?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Encryption Algorithms

A

only differ at 22 positions of the 64-bit positions in total.
If this problem occurs for many plaintexts, then the avalanche effect is not working well enough.

Without the avalanche effect (especially provided by the S-boxes), the differential cryptanalysis would be facilitated.

17
Q

RSA

Requirements

18
Q

RSA

Choice of N, c und d

19
Q

RSA

Encryption

20
Q

CFM & OFB

21
Q

Assume that, due to a transmission error, one bit is changed in a cipher block somewhere in C. Explain the advantages and disadvantages of the error propagation in OFB!

22
Q

Consider the following example: After Eve has inserted the 0 in plaintext P′, she observes the ciphertext C′. Try to decrypt the suffix of P.

23
Q

four requirements of good cryptographic hash functions

24
Q

Diffie-Hellmann

A
  • if p is a prime of at least 300 digits, and a and b are at least 100 digits: discrete logarithm problem (can not be computed in realistic time using public information)
  • The problem here: authenticity of Alice and Bob is not validated
25
Explain why the RSA algorithm can currently be regarded as a very safe encryption method. Which future developments can decrease the security of RSA in a significant way?
* strength of RSA lies in the factorisation problem * exponential time complexity * currently practically infeasible to compute p and q * quantum computer
26
advantages and disadvantages of RSA compared to a symmetric-key method
Ad * **secure key exchange**: RSA the secret key (private key) is not transmitted, only the public key. * public key system **allows everybody to send** encrypted messages without prior com- munication with the receiver. * In RSA, communication between **k partners requires only k key pairs**. DisAd * High **computational cost** for encryption and decryption: too large to be used on large amounts of data. This is why RSA is often used in combination with other symmetric methods * easy to break if there are **only few possible plaintext** messages.
27
A hacker makes copies of the Ecash money files you have stored on your computer. Can he spend the money? Explain your answer!
* digital bank notes are not associated with a person, but with the **emitting bank** * respective bank keeps track of all **serial numbers** of the spent and signed bank notes, so that these notes can only be **used once**
28
What is the purpose of the dual signature used in the SET-protocol?
* **accountability** and **traceability** are **restricted** * The purpose is to have a **combination of order and payment information** in the signature without disclosing the order to the bank and the payment information to the merchant.
29
Why does it make sense to apply a hash function on the secure passphrase?
compress passphrases of arbitrary length to fixed length keys, does not increase the security entropy is in fact reduced **hashing the hash itself** for a large number of times increases the time an attacker spends
30
Explain the reasons which justify the use of a separate data key.
when you have a separate data key, you just have to **de- and reencrypt the single key**, which can be done in an instance With a separate data key, you can **generate a copy of this key** and let your **colleague encrypt it** with his personal passphrase
31
Why are asymmetric-key methods like RSA better suited for digital signatures compared to symmetric-key methods?
* signature needs to be associated with **one person** * **private key is the unique** thing that clearly identifies a person * exists in **asymmetric-key methods** and not in symmetric-key methods
32
Explain what certification authorities are and why they are necessary.
* **officially institution** which guarantees the validity and the correctness of public keys with * a **key certificate** * -\> verify the signature is the public **key of the correct person** * prevents: **man- in-the-middle attack**