Chapter 3 Cryptography Flashcards

1
Q

Nonrepudiation

A

ability to provide positive identification of source; (most common app is digital signatures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Symmetric Cryptography

A

Same key is used encrypt/decrypt; -PROS: [P]reserving confidentiality, [I]ncreasing speed, [P]roviding authenticity, [E]nsuring simplicity -CONS: Key mgmt issues, Lack of nonrepudiation features (i.e. Rijindael or Advanced Encryption Standard (AES) is used by U.S. to encrypt govt files)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Assymetric Cryptography

A

public key system that features key pair: public & private key; The public key is published somewhere, whereas private is always in user’s possession; Both keys can encrypt, but only private can reverse process; Keys must be associated w/ user in trusted manner; -PROS: has nonrepudiation; Key distribution benefits; improved privacy, security, & authentication (i.e. Hash Function) -EXAMPLE: Alice wants to send a private message to Bob so she locates Bob’s public key to encrypt the message, now only Bob’s private key can decrypt. (Everyone’s public key is known) -If Alice uses her private key to encrypt, then that is where digital signatures come into play; Now when Bob receives the msg, he needs to locate Alice’s public key & use it to verify the private key was used, if reversed, that means the msg came from Alice, if can’t be reversed, it didn’t come from Alice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hash function (Hashing)

A

ONE WAY used in both creating & verifying digital signature; it is an algorithm that creates a digital fingerprint in the form of a hash value/result of a FIXED length (which is usually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PKI

A

Public Key Infrastructure - an arrangement that binds public keys with respective user by means of CA (certificate authority)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Digital Certificate

A

an electronic credential unique to a person, computer, or service; sealed object populated with various pieces of info principal function is to bind key pair with particular subscriber; if conditions violated, certificate must be revoked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Signing certificate

A

generate a hash value & encrypt it w/ issuer’s private key For an attacker to compromise, they would need private key of the server or private key of issuer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CA

A

A certificate authority creates & revokes certificates that it has in its control along with the associated public keys; it is a trusted third party responsible for issuing, managing, identifying, & revoking certificates PLUS enrolling parties for their own certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Functions of CA (5)

A

1) Generation of Key Pair
2) Generation of Certificates
3) Publication of Public Key
4) Validation of Certificates (CA acts as third party between two parties who DK each other)
5) Revocation of Certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital Signature components

A

hash of message

encrypted with private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Other types of Attacks on Cryptography

A

1) Ciphertext-only Attack - least successful; attacker has limited knowledge, only has Ciphertext but not corresponding plaintext or the key (goal is to find plaintext)
2) Known Plaintext Attack - similarities to brute force; attacker has plaintext & ciphertext of 1+ msgs; Attacker uses this to determine key
3) Chosen Plaintext Attack - attacker is able to generate ciphertext by chosen plaintext; attacker can “feed” info into ES (encryption system) & observe output, but may not know algorithm or key in use
4) Chosen Ciphertext Attack - attacker able to decrypt chosen ciphertext into corresponding plaintext; attacker can “feed” info into DS (decryption system) & observe output, but may not know algorithm or key in use
5) Record traffic through sniffing, retransmit info later & extract key from traffic
6) MiTM attack - attacker gets between two users communicating w/ goal of intercepting & modifying packets
7) Social Engineering - coercing a user to accept a self-signed certificate, exploit vulnerabilities in web browser, take adv of cert approval process to receive valid cert to put on attacker’s own site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IPSec & its two mechanisms

A

Internet Protocol Security - set of protocols designed to protect confidentiality & integrity of data as it flows over a NW; works at NW layer of OSI model & processes packets according to predefined group of settings; Often used w/ out major changes to computer systems; Good for VPN & remote user access

Provides two mechniams

1) Authentication Header (AH) - provides authentication of service & sender of data
2) Encapsulating Security Payload (ESP) - authenticates info + encrypt data

All of this information is inserted into a packet in a header that follows the IP packet header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PGP

A

Pretty Good Privacy - uses public key encryption; most widely recoganized;

protect privacy of online communication + data (on HD or removable drives) Email or IM travels to destination in encrypted form, recipient uses PGP to decrypt to plaintext Similar to private/public key mechanism described earlier;

PGP user can use private key to digitally sign outgoing mail to authenticate sender (third party would not have access to private key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSL

A

Secure Sockets Layer - standard for exchanging data securely over insecure channels such as the internet;

supported by all modern browsers & email clients transparently so whenever you are using your web browser,

SSL provides a secure connection between your web browser and websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Root CA

A
  • initiates all trust paths; TOP; If its trust is questioned, all other systems become invalid
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trusted Root CA

A

A Root CA added to an application such as browser by SW vendor

17
Q

Peer CA

A

provides self-signed certificate that is distributed to its certificate holders & used by them to initiate certification paths

18
Q

Subordinate CA

A

(aka Child CA) - does not begin trust paths; Trust initiated from root CA

19
Q

Registration Authority (RA)

A

entity positioned between client & CA that is used to take load from CA; CANNOT generate certificate, can accept requests, verify person’s identity, & pass info to CA