CH 4 Flashcards

1
Q

In the present era, not only business but almost all the aspects of human life are driven by ….. .

A

Information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attacks are typically categorized based on ….. .

A

The action performed by the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attacks can be ….. or ….. .

A

Passive, Active.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The main goal of a passive attack is ….. .

A

To obtain unauthorized access to the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

actions such as ….. and ….. on the communication channel can be regarded as passive attack.

A

Intercepting and eavesdropping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A passive attack is often seen as ….. .

A

Stealing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An active attack involves ….. in some way by conducting some process on the information.

A

Changing the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Examples of active attacks:

A
  • Modifying the information in an unauthorized manner.
  • Initiating unintended or unauthorized transmission of information.
  • Alteration of authentication data such as originator name or timestamp associated with information.
  • Unauthorized deletion of data.
  • Denial of access to information for legitimate users (denial of service).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

While considering possible attacks on the cryptosystem, it is necessary to know the ….. .

A

Cryptosystems environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The attacker’s ….. and ….. about the environment

decides his capabilities.

A

Assumptions and Knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two cryptography algorithms that the design of a cryptosystem is based on ?

A
  • Public Algorithms

- Proprietary algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Public Algorithms.

A

With this option, all the details of the algorithm are in the
public domain, known to everyone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Proprietary algorithms.

A

The details of the algorithm are only known by the system designers and users. security is ensured through obscurity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why are private algorithms not preferred ?

A

Because they are developed in house and may not be investigated for weakness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

private algorithms allow communication among ….. .

A

Closed group only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does Kerckhoff’s principle state ?

A

The algorithm is preferred to be

public with strength of encryption lying in the key.

17
Q

the first assumption about security environment is that the ….. .

A

Encryption algorithm is known to the attacker.

18
Q

in cryptography what are the three assumptions made about the security environment and attacker’s capabilities.

A
  • Details of the Encryption Scheme.
  • Availability of Ciphertext.
  • Availability of Plaintext and Ciphertext.
19
Q

The basic intention of an attacker is ….. .

A

To break a cryptosystem.

20
Q

To obtain the plaintext, the attacker only needs to ……

A

Find out the secret decryption key.

21
Q

The attacker applies maximum effort towards ….. .

A

Finding out the secret key used in the

cryptosystem.

22
Q

Once the attacker is able to determine the key, the attacked system is considered as ….. .

A

Broken or compromised.

23
Q

Based on the methodology used what are the categories of the attacks on cryptosystems ?

A
  • Ciphertext Only Attacks (COA)
  • Known Plaintext Attack (KPA)
  • Chosen Plaintext Attack (CPA)
  • Dictionary Attack
  • Brute Force Attack (BFA)
  • Birthday Attack
  • Man in Middle Attack (MIM)
  • Side Channel Attack (SCA)
  • Timing Attacks
  • Power Analysis Attacks
  • Fault analysis Attacks
24
Q

What are the 4 types of attacks ?

A
  • Interception
  • Interruption
  • Modification
  • Fabrication