Chapter 8 Flashcards
What are the the security features of the CIA model?
- Confidentiality
- Message integrity
- End-point authentication
- Operational security
What does confidentiality provide?
Only the sender and the intended receiver should be able to understand the contents of the transmitted message.
What does message integrity provide?
Ensure that the content of their communication is not altered, either maliciously or by accident, in transit. Extends checksumming from the transport layer.
What does end-point authentication provide?
Both the sender and the receiver should be able to confirm the identity of the other party involved in the communication - to confirm that the other party is indeed who or what they claim to be.
Why are keys important to network security?
Because encryption algorithms and protocols are known, published and standardized. Thus, nothing prevents a intruder from exploiting these methods.
In layman’s terms what does Ka(m) do?
Encrypt message ‘m’ with key ‘Ka’
What does this represent: Kb(Ka(m))
The decryption of Ka’s message ‘m’
What is the property of a symmetric key system?
Ka and Kb are known to both hosts. They are identical and secret.
How does a public key system works?
- One of the keys is known to the world (i.e. public)
- The other key is known to either host A or B (not both)
What is a ciphertext-only attack?
Intercept the ciphertext message and use statistical analysis to break the encryption theme.
What is a known-plaintext attack?
When you have a priori knowledge of certain combinations of the content of the message.
What is a chosen-plaintext attack?
When you have access to plaintext message and the encrypted version.
Block ciphers are used for what major Internet protocols?
- PGP (e-mail)
- SSL (TCP connections)
- IPsec (network layer security)
What is a good measure to prevent brute force attacks with block ciphers?
Increase the size of the ‘blocs’ being encrypted.
Example
Block size 3 –> 40,320 permutations
(2^3 = 8 = 8!)
Block size 64 –> 1.8446744e+19… hard to brute force
Why are block cipher tables not a feasible solution?
Host A and Host B would have to hold a table (example) of 2^64 values. If they were to change, they would need to change the table again.