Crypto Protocols Flashcards

1
Q

Reflection Attack

A
  • message is encrypted
  • attacker can send the original message back to the sender
  • if m = “pay peter 200 €”; peter would get 400
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Defence Reflection Attack

A
  • put the original sender in the encryption

- attacker can no longer reflect to original person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Replay Attack

A
  • attacker copies message and send several time to a person

- if m = hans, “pay peter 200 €”; peter would get from receiver 400

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Defence Replay Attack

A
  1. with timestamps
    - needs global clock
  2. Nonces
    - > b sends a nonces; a puts nonces in message
    - A nonce (“Number used ONCE”)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PC (plain-cipher)
CP (cipher-plain)
CC (cipher-cipher)

A
PC:
b to a: nonce
a to b: {A, m, nonces}_k_AB
CP:
b to a: {A, m, nonces}_k_AB
a to b: nonces -> as acknowledgment
CC:
b to a: {B, m1, nonces}_k_AB
a to b: {A, m2, nonces}_k_AB

all encrypted m can just be decrypted by a and b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TLS: Transport Layer Security - Record Protocol

A
  • en-/decrypts and validates data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TLS Handshake Protocol

A

C -> S: highest TLS + nonces + session ID
S -> C: chooses TLS + nonces + copied session ID from C
S -> C: server certificate + DH parameters + ask C for certificate
C -> S: certificate + DH parameter + {pre-master secret}_enc pub key of S + CV -> signs handshake with certificate
C -> S: sends changed_cipher_specs
S -> C: finished

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why ID’s in TSL?

A
  • multiple TLS connection share a session

- resume a session or add one to it; very easy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why DH in TLS and not RSA?

A
  • if RSA key leaked whole conversation can be leaked

- with DH -> perfect forward security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSL 2.0 weaknesses

A
  • no support for non-RSA alg. and certificates
  • attacker could delete padding of MAC
  • DOWNGRADE ATTACK (give server options with venerability in it)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TLS traffic analysis

A
  • if content on server is know and m has certain size we can assume that this was dowloaded
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Common Name (CN)

A

determines domain validity
e.g. for www.google.com
or *.brainscape.com
-> wildcard, also a.b.brainscape.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PKI / Certificate Hierarchy

A

Public Key Infrastructure (PKI)

  1. Root CA: trusted by everyone
  2. Intermidiary CA: root CA trust tehem to issu certificates
  3. End entities: Users, system, devices

-> chain of trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly