CIS 473 Final Question Set 2 Flashcards
How does the one-way Hash Functions work ?
- Accepts a variable-size message M as input and produces a fixed-size message digest H(M) as output
- Does not take a secret key as input To authenticate a message, the message digest is sent with themessage in such a way that the message digest is authentic
What is the Secure Hash Algorithm ?what and when oraganization develop it ?
SHA was developed by NIST and published as a federal information processing standard (FIPS 180) in 1993 Was revised in 1995 as SHA-1 and published as FIPS 180-1
- The actual standards document is entitled “Secure Hash Standard”
- Based on the hash function MD4 and its design closely models MD4
- Produces 160-bit hash values
- In 2005 NIST announced the intention to phase out approval of SHA-1 and move to a reliance on SHA-2 by 2010
How does HMAC happen?
There has been an increased interest in developing a MAC derived from a cryptographic hash code, such as SHA1 Cryptographic hash functions generally execute faster in software than conventional encryption algorithms such as DES Library code for cryptographic hash functions is widely available A hash function such as SHA-1 was not designed for use as a MAC and cannot be used directly for that purpose because it does not rely on a secret key
What is the Public Key and How does it get devloped?
is the first truly revolutionary advance in encryption in literally thousandsof years.
Based on mathematical functions rather than on simple operations on bit patterns .
Is asymmetric, involving the use of two separate key
What are the misconceptions of Public-Key Encryption Structure ?
There is a feeling that key distribution is trivial when using public-key encryption, compared to the rather cumbersome handshaking involved with key distribution centers for conventional encryption
Public-key encryption is more secure from cryptanalysis than conventional encryption
•Public-key encryption is a general-purpose technique that has made conventional encryption obsolete
How does Public and Private key related to each other ?
This is a pair of keys that have been selected so that ifone is used for encryption, the other is used for decryption. The exact transformationsperformed by the encryption algorithm depend on the public orprivate key that is provided as input.
How does the symmetric encryption work ?
•For symmetric encryption to work, the two parties to an exchange must share the same key, and that key must be protected from access by others•Frequent key changes are usually desirable to limit the amount of data compromised if an attacker learns the key•Key distribution technique•The means of delivering a key to two parties that wish to exchange data, without allowing others to see the key
What is the Kerberos ?
•Key distribution and user authentication service developed at MIT•Provides a centralized authentication server whose function is to authenticate users to servers and servers to users•Relies exclusively on symmetric encryption, making no use of public-key encryption
What is Kerberos Version 4 ?
- A basic third-party authentication scheme Authentication Server (AS)
- Users initially negotiate with AS to identify self
- AS provides a non-corruptible authentication credential (ticket granting ticket TGT)•Ticket Granting Server (TGS)
- •Users subsequently request access to other services from TGS on basis of users TGT
What is the Key Distribution Using Asymmetric Encryption ?
One of the major roles of public-key encryption is to address the problem of key distribution There are two distinct aspects to the use of public-key encryption in this regard: 1.The distribution of public keys
2. The use of public-key encryption to distribute secret keys
Public-key certificate Consists of a public key plus a user ID of the key owner, with the whole block signed by a trusted third party Typically, the third party is a certificate authority (CA) that is trusted by the user community, such as a government agency or a financial institution. A user can present his or her public key to the authority in a secure manner and obtain a certificate.The user can then publish the certificate Anyone needing this user’s public key can obtain the certificate and verify that it is valid by way of the attached trusted signature
What is IEEE 802.1X ?
This is a link layer protocol that enforces authorization beforea port is assigned an IP address. IEEE 802.1X makes use of the ExtensibzleAuthentication Protocol for the authentication process
What is Network Access Control (NAC) ? ( 3 answers)
•An umbrella term for managing access to a network
•Authenticates users logging into the network and determines what data they can access and actions they can perform
•Also examines the health of the user’s computer or mobile device
What is The Extensible Authentication Protocol (EAP) ?
acts as aframework for network access and authentication protocols. EAP provides a setof protocol messages that can encapsulate various authentication methods to beused between a client and an authentication server.
What are the two authentication methods that support EAP ?
- EAP Transport Layer Security
* EAP Tunneled TLS
What is EPA Transport Layer Security (EPA TLS) ?
defineshow the TLS protocol can be encapsulated in EAPmessages.EAP-TLS uses the handshake protocol in TLS, not its encryptionmethod.Client and server authenticate each other using digital certificates.Client generates a pre-master secret key by encrypting a random number withthe server’s public key and sends it to the server. Both client and server usethe pre-master to generate the same secret key