Chapter 3: Encryption and Related Technologies Flashcards
What is homomorphic encryption?
Allows encrypted information to be manipulated without decrypting it first (data in use)
What is multiparty computation?
Allows two or more computers to participate in a computation and compute a mathematical result without otherwise revealing private information
What does the term encrypt mean?
To convert information or data into a cypher or code
What is a cypher?
Mathematical transformations of data, in which data is scrambled according to some kind of function
What is a code?
Transformations that typically involve a one-to-one replacement of a word, letter, figure or symbol with another word, letter, figure or symbol
What is the difference between plaintext and cyphertext?
Plaintext - clear and readable text
Cyphertext - the encrypted message
What is the work factor?
The amount of effort that an adversary needs to expend to decrypt a message
What is threat modeling?
Understanding the adversary the system has been designed to protect against, the capabilities that adversary has, and the likely forms of attack the system may experience
What is a cryptographic system?
Collection of cryptographic algorithms, protocols, software and other items that use cryptography to achieve information security goals
What factors can cause cryptographic implementation flaws?
- Bugs - Implementation errors
- Back doors - Flaws that have been deliberately placed in a product for later exploitation
- Weaknesses - Mathematical vulnerabilities that are unknown when they are developed and deployed but are later discovered
- Obsolescence - Erosion over time
Why is entropy important?
Merely encrypting with an algorithm and a key is not sufficient to ensure security. It is also necessary to use randomness, also called entropy, so that an attacker observing the output of an encryption system cannot determine if the same message is encrypted a second time
Where must entropy be applied in modern cryptographic systems?
Both in creating keys and encrypting messages
List the 2 kinds of encryption algorithms
Secret key algorithms (aka symmetric)
Public key algorithms (aka asymmetric)
What is a symmetric or secret key algorithm?
Uses the same key to encrypt and decrypt the plaintext
What is an asymmetric or public key algorithm?
Designed so that the plaintext can be encrypted using only public information, but decrypting the cyphertext requires the use of private information
Is RSA a symmetric or asymmetric algorithm?
Asymmetric
What is the most common symmetric algorithm in use today?
AES - typically used with 128 or 256 bit keys
What is a brute force attack?
Try every possible key
What is another name for a brute force attack?
Key search attack
What technology will theoretically be capable of breaking 128-bit AES with relative ease?
A sufficiently large quantum computer
Though it is believes that it will not have the ability to crack AES-256 in any reasonable amount of time
Why is it a bad idea to develop your own encryption algorithm?
Secret algorithms are typically weaker because they have not been as widely tested
It is also difficult to understand the risk of using such an algorithm
What are the differences between a cryptographic key and a password?
With a cryptographic key
• Information must be mathematically transformed
• Does not decide whether or not to grant access
• Cannot be reset if the key is lost
• To change the key you have to decrypt then re-encrypt the information
With a password
• Access to the controlled information is mediated by a program
• Because the program is making decisions, it can be manipulated by other factors (ex. the system allows access without a password Thursdays at 5)
• Software accessed confidential parts of the program even when a password is not provided
Which private key algorithm was published by the US government in their Federal Information Processing Standard (FIPS) in 1977?
Data Encryption Standard (DES)
A public demonstration in 1998 showed that DES could be broken, what was the solution?
Encrypting a message with DES three time over, each time with a different key (a technique called triple DES or 3DES)
Why was cryptography not widely used until the rise of e-commerce in the 1990s?
Lack of workable public key cryptography
Export controls - government restricted the export of any computer technology that could perform cryptography
CPU speed
Which browser first incorporated transparent cryptography in 1995?
Netscape Navigator
What encryption protocol do web browsers use to automatically encrypt information as it travels between browser and web server?
Secure Socket Layer (SSL) - later renamed to Transport Layer Security (TLS)
Often called SSL/TLS today
What is a pluggable cryptographic protocol?
The single protocol supports the use of multiple hash functions and ciphers
How does TLS determine which algorithm to use?
TLS client connects to a TLS server, the two negotiate the most secure version of each algorithm from the set of algorithms that each implement
What does TLS not protect?
Knowing how much data is exchanged and what the endpoints are
Knowing that data is being exchanged at all
TLS provides neither anonymity or stealth
To achieve anonymity, it is necessary to hide one’s traffic within a crowd, which systems can do this?
Proxies and mix networks, also called onion routing networks
How do systems such as onion routing networks work?
Combine traffic from multiple computers into a single channel that is sent between multiple computers and then separating out the traffic again
How does the onion router (Tor) work?
Uses a sophisticated system that relies on multiple layers of encryption and sends every users’ traffic to at least three different computers in sequence, so that not even the nodes of the mix network know with whom the users are communicating
To offer stealth, it is necessary to masquerade one’s traffic so that it cannot be observed, how can this be done?
By hiding the traffic using a masking protocol or using steganography
TLS works at the transport layer, some internet telephone protocols use encryption at which layer?
Application layer
Which wireless network protocols have encryption built in?
802.11 WPA and WPA2
Which 2 approaches are commonly used to encrypt data at rest?
Application level encryption
Device level encryption
Application level encryption is also known as…
File-level or document-level encryption
Where is device-level encryption is applied?
It is built into the computer’s storage subsystem and performs encryption on a block-by-block basis
List the 3 approaches for working with encrypted data
Secure enclaves
Homomorphic encryption
Multiparty computation
What are secure enclaves?
- They rely on modifications to the microprocessor to provide security
- Some of these systems rely on curtained memory, which prevents the microprocessor from accessing the memory where the secure application is running
- Another approach uses specialized hardware within the microprocessor to automatically encrypt memory as it is written and decrypt it as it is read
What is homomorphic encryption?
A collection of mathematical techniques for working with encrypted data
What is multiparty computation?
Multiparty computation is a class of algorithms that allows programs running on different computers to participate in computations such that results can be computed without compromising each party’s private data
What are digital signatures?
Using encryption to certify that a document has not been modified since some time in the past
What 2 kinds of cryptographic quantum technology have already been demonstrated in the laboratory?
Quantum computers
Quantum key distribution (QKD)
What is quantum key distribution (QKD)?
Approach for distributing an encryption key to two endpoints so that it is physically impossible (according to our understanding of physics) for a third party to get a copy of the key
List the 2 kinds of secret key algorithms
Stream ciphers
Block ciphers
What are stream ciphers?
Encryption algorithms that transform one byte of data at a time
The RC4 algorithm was widely used in the 1990s with the Netscape SSL protocol and is still somewhat used today, although its popularity is waning
What are block ciphers?
Transform a small block of data at one time, typically 16, 32 or 64 bytes
Both DES and AES are block ciphers
Which 2 mathematical functions are ciphers based on?
Substitution
Transposition
What is substitution in encryption?
Substitutes one pattern for another according to a code book
What is transposition in encryption?
Scrambling the bits within a set of bytes
Traditionally, do steam ciphers use substitution or transposition?
Substitution
Traditionally, do block ciphers use substitution or transposition?
Both
Which is generally considered safer, stream ciphers or block ciphers? Why?
Because stream ciphers typically only use substitution and block ciphers use both substitution and transposition, block ciphers are somewhat more secure
What is the drawback of block ciphers versus stream ciphers?
Block ciphers are generally slower because they perform both substitution and transposition
Though today’s computer are fast enough to allow stream ciphers to be used as block ciphers and vice versa in the majority of applications
Which algorithm was adopted by the US government in 2001?
AES
What weaknesses does AES have?
Currently regarded as containing no significant algorithmic weaknesses
How does AES work?
Consists of an inner mathematical operations that is repeated
AES-128 repeats this function 10 times and is said to have 10 rounds
AES-192 has 12 rounds
AES-256 has 14 rounds
Each round makes it harder to decrypt
Which encryption algorithm has the US National Security Agency (NSA) for top secret information?
AES-256 (but not AES-128)
Why do some organizations use triple DES over AES?
They believe it is more thoroughly understood than AES
Which algorithm was developed by the Chinese government?
SM4
What are lightweight encryption algorithms?
Algorithms designed to encrypt small amounts of data - just a few bytes - or that must run in low-powered environments
List 2 examples of lightweight encryption algorithms
SIMON and SPECK, both developed by the NSA
What is cryptanalisys?
The process of trying to decipher an encrypted message without knowing the key
A brute force attack is the most basic form of cryptanalysis, what do more sophisticated methods rely on?
Analyzing individual mathematical operations that create the encryption algorithm and correlating many applications of the algorithm over a large set of data
In what circumstances is an encryption algorithm considered broken?
- Known ciphertext attack
- Known plaintext attack
- Chosen plaintext attack
- Differential cryptanalysis
- Related key attack
What is a Known cyphertext attack?
Given a ciphertext C, the attacker can determine the plaintext P
What is a Known plaintext attack?
Given a plaintext P and a ciphertext C, the attacker can determine the encryption key K
What is a Chosen plaintext attack?
Given a plaintext P of the attacker’s choosing and the encrypted ciphertext C of that message, the attacker can determine the encryption key K
What is Differential cryptanalysis?
Given a number of similar plaintext messages P1 through PN and the corresponding ciphertext messages C1 through CN, the attacker can determine encryption key K
What is a Related key attack?
Given a number of related keys and a collection of ciphertext encrypted with each key, it is possible to learn some or all of the keys, and therefore decrypt some or all of the ciphertext
Why was DES-128 weaker than DES-56?
The change to the substitution boxes that NSA had applied to the original 128-bit algorithm submitted by IBM had made the algorithm stronger
By the mid-1990s, why was 56-bit DES no longer considered sufficiently long?
It could be brute-forced by Deep Crack (a million-dollar special-purpose computer created for the purpose of demonstrating the weakness of the algorithm
What is a Clipper chip?
A microchip with encryption embedded, developed by the US government in the mid-1990s
Why was the Clipper chip not commercially successful?
- Featured a mandatory key escrow that would have let the U.S. government decode Clipper-encoded messages with a valid court order
- Hardware vendors did not want to accept the additional costs and manufacturing complexities of adding a U.S. government chip to their products
- Organizations that needed more than 56 bits of security but still wished to follow government standards could simply use triple DES or 3DES
List 4 symmetric algorithms
DES
3DES (triple DES)
RC4
AES