cryptography intro Flashcards

1
Q

what is cryptography

A

what it means to be mathematically secure and designing systems to achieve this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are security services

A

specific security goals we want to acheive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are some examples of security services

A

confidentiality
data integrity
data origin authentication
non-repudiation
authentication
accountability
anonymity
verifyability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

confidentiality

A

data cannot be viewed by unauthorised users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

data integrity

A

data cannot be altered without permissions and you can determine when data is being altered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

data origin authentication

A

can verify the person who created the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

non-repudiation

A

a user cannot deny previous action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

kerckhoff’s principle

A

a cryptographic system should be secure even if everything about it except the key is public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

passive attacks

A

the attacker doesnt change the data or processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are two examples of passive attacks

A

unauthorised access to data
traffic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

traffic analysis

A

can notice patterns on how entities are communicating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

active attacks

A

altering the system information in some way usually changing the data or processes that act on the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are three examples of passive attacks

A

masquerade
replay
modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

masquerade (passive attacks)

A

pretending to be the sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

replay (passive attacks)

A

the attacker intercepts the message then passes it on at some point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how can we prevent replay passive attacks

A

digital signatures
time stamps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

modification (passive attacks)

A

intercepts and changes the message

18
Q

how can we prevent modification passive attacks

A

confidentiality and integrity mechanisms

19
Q

what are the 3 types of cryptosystems

A

encryption systems
digital signatures
hashing

20
Q

what do encryption systems aim to provide

A

plaintext confidentiality

21
Q

how can the attacker discover the decryption key

A

through an exhaustive key search

22
Q

exhaustive key search

A

trying to decrypt the cipher text using every possible key until you find the right one

23
Q

how can we prevent attackers discovering the decryption key via an exhaustive key search

A

making the key so long that its computationally impractical to discover

24
Q

how is the exhaustive key search used as a bench mark for security

A

every other attack should take longer than the time it would take to complete

25
Q

what are the 4 forms of plaintext message recovery

A

ciphertext only attack
known plaintext attack
chosen plaintext attack
chosen ciphertext attack

26
Q

ciphertext only attack

A

the passive attacker only knows the ciphertext

27
Q

known plaintext attack

A

knows some plain and ciphertext pairs

28
Q

in which two ways could the attacker get the plaintext

A

careless sender or receiver
guesses the correct decryption

29
Q

chosen plaintext attack

A

the attacker knows the pairs when they have chosen the plaintext

30
Q

chosen ciphertext attack

A

knows the plain and ciphertext pairs when theyve chosen both
has access to encryption and decryption services

31
Q

what are the security aims of digital signatures

A

data integrity, origin authentication, and non-repudiation

32
Q

what does it mean for the attacker to make a forget (dig sig)

A

creating a valid signature without the key

33
Q

selective forgery

A

outputting a signature for a specific message

34
Q

existential unforgeability

A

without having the secret key, you shouldnt be able to forge a valid signature
outputting a signature for a message chosen by the attacker

35
Q

what are some criteria for hash functions

A

must be a compression function
must be easy to compute(efficient computation)
should be infeasible to go the other way

36
Q

compression function

A

for any length input the output should be the same length

37
Q

what are some of the security criteria for hash functions

A

preimage resistance
second preimage resistance
collision resistance

38
Q

preimage resistance

A

one a message has been hashed it should be computationally infeasible to get the original message
hash functions should be one way

39
Q

second preimage resistance

A

it should be computationally infeasibly to find another message with the same hash as a specific message

40
Q

collision resistance

A

it should be computationally infeasible to find two messages with the same hash

41
Q

birthday attacks

A

how many messages do we need to randomly select before there is a greater than 50% chance of collision