Chapter 8 Flashcards

1
Q

What are the the security features of the CIA model?

A
  • Confidentiality
  • Message integrity
  • End-point authentication
  • Operational security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does confidentiality provide?

A

Only the sender and the intended receiver should be able to understand the contents of the transmitted message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does message integrity provide?

A

Ensure that the content of their communication is not altered, either maliciously or by accident, in transit. Extends checksumming from the transport layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does end-point authentication provide?

A

Both the sender and the receiver should be able to confirm the identity of the other party involved in the communication - to confirm that the other party is indeed who or what they claim to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why are keys important to network security?

A

Because encryption algorithms and protocols are known, published and standardized. Thus, nothing prevents a intruder from exploiting these methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In layman’s terms what does Ka(m) do?

A

Encrypt message ‘m’ with key ‘Ka’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does this represent: Kb(Ka(m))

A

The decryption of Ka’s message ‘m’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the property of a symmetric key system?

A

Ka and Kb are known to both hosts. They are identical and secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a public key system works?

A
  • One of the keys is known to the world (i.e. public)

- The other key is known to either host A or B (not both)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a ciphertext-only attack?

A

Intercept the ciphertext message and use statistical analysis to break the encryption theme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a known-plaintext attack?

A

When you have a priori knowledge of certain combinations of the content of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a chosen-plaintext attack?

A

When you have access to plaintext message and the encrypted version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Block ciphers are used for what major Internet protocols?

A
  • PGP (e-mail)
  • SSL (TCP connections)
  • IPsec (network layer security)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a good measure to prevent brute force attacks with block ciphers?

A

Increase the size of the ‘blocs’ being encrypted.

Example

Block size 3 –> 40,320 permutations
(2^3 = 8 = 8!)

Block size 64 –> 1.8446744e+19… hard to brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why are block cipher tables not a feasible solution?

A

Host A and Host B would have to hold a table (example) of 2^64 values. If they were to change, they would need to change the table again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

At a high level how what are the steps for public key encryption?

A
  • Host A gets the public key from Host B
  • Encrypts its message Kb+(m)
  • Send encrypt message to Host B
  • Host B decrypts the message with its private key Kb-(Kb+(M))
17
Q

What are two conceptual issues with public key encryption?

A
  • Someone can intercept the Kb+(m) and break it with know public key protocols
  • The private key host has no way to identify who is sending the message (e.g. is Alice (good) or Trudy (bad))
18
Q

What is the feature of the RSA algorithm sets it apart?

A

Extensive use of arithmetic operations using modulo-n arithmetic

19
Q

Why does RSA provides great security but can’t guarantee it?

A

Because it relies on the fact that there are no known algorithms for quickly factoring a number.

Conversely, it is not known where or not there exist fast algorithms for factoring a number. E.g. government secret.

20
Q

What is the property of a cryptographic hash function?

A

Computationally infeasible for an intruder to substitute one message for another message that is protected by the hash function. e.g. H(x) = H(y)

21
Q

What are the two major hash algorithms?

A

MD5 (message digest 5)

SHA-1 (secure hash algorithm)

22
Q

What are the three steps of using a hash function?

A
  1. Host A creates message ‘m’ and hashes it H(m)
  2. Host A appends the hash to message ‘m’ -> (m, H(m)). Sends it to Host B
  3. Host B receives (m, h) and calculates H(m). If H(m) = h - message integrity achieve (not really, there’s a flaw))
23
Q

What is a flaw with just using hash functions?

A

A third host, Host C, could send a message using a ‘bogus’ message and the hash would check out, thus Host B could think the message was sent by Host A.

24
Q

What is needed to perform message integrity in addition to hash functions?

A

A shared secret between Host A and Host B –> authentication key.

25
Q

How is a MAC (message authentication code) created?

A

Concatenate a message with the secret and hash it -> H(m+s)

26
Q

What is the purpose of a digital signature?

A

That is, it must be possible to prove that a document signed by an individual was indeed signed by that individual (the signature must be verifiable) and that only that individual could have signed the document (the signature cannot be forged).

27
Q

Why is public key cryptography an ideal candidate for digital signatures?

A

Because a host needs to have both a private and public key that are both unique to it.

28
Q

What is the process to create a digital signature? Why does this protect from message modification?

A

Use the private key to sign the document i.e. Kb-(m)

K+b(K-b(m)) = m

It protects from modification because the signature for K-b(m) != k-b(m`)

29
Q

How does a client-server negotiate agree on cipher suite?

A
  • Client offers choice

- Server picks one

30
Q

What are the steps of an SSL handshake?

A
  1. Server auth
  2. negotiation
  3. establish keys
  4. Client auth (optional)