Domain 3 - Cryptographic concepts | Crypto Attacks | PKI Infrastructure Flashcards
Symmetric Encryption - Strengths
Speed, and strength per bit of key
Symmetric Encryption - Weakness
Key must be shared securely
Symmetric Encryption - Stream Cipher
Each bit is independently encrypted
Symmetric Encryption - Block cipher
Blocks of data are encrypted
Initialization Vector
Symmetric EncryptionEncryption step. Used on Symmetric ciphers to ensure that the first block of data is random
DES Encryption type
Symmetric
DES
Data Encryption Standard
DES Encryption dates
1976 US Fed standard
DES Encryption, who designed
IBM, based on older lucifer symmetric cipher
DES Encryption, block size
64 bit
DES Encryption, key size
56 bit
DES Modes
5 modes
Double DES
The DES encryption algorithm with two rounds, with two keys. Rendered unusable due to being susceptible to meet in the middle attacks.
Triple DES
Expands the size of the key by running the algorithm in succession with three different keys. It makes 48 passes through the algorithm, and the resulting key is 168 bits.
IDEA Encryption/Cipher Type
International Data Encryption Algorithm.Symmetric Block Cipher
IDEA - good or bad?
Held up to cryptanalysis
IDEA - drawback
Patent encumbrance (no longer an issue, not sure if tested as an issue or not) and slow speed
AES Acroynym and encryption type
Advanced Encryption Standard - Symmetric
AES Block and Key Size
128 bit block
Key - 128 bit to 256 bit.
128 with 10 rounds of encryption192 bit with 12 rounds of encryption 256 bit with 14 rounds of encryption
Blowfish cipher type
symmetric
RC5 and RC6 designed by
RSA Labs
Asymmetric Encryption Pros
Solves issues around preshared keys
Asymmetric key how many
two. Public/private key pair
hashing/one-way functions
easy to compute one way. VERY difficult to reverse
Asymmetric, factoring prime numbers. factorization.
Relies on strength of composite number. Example: 6269 x 7883 = 49418527.To crack, you must factor 49418527 to find which two prime numbers are factors.
Discrete logarithm
Basis of the Diffie-hellman and El Gamal asymmetric algs
Uses in Asymmetric algorithms. Way to ensure encryption.
More advanced than factorization and considered more secure.
Diffie-Hellman Key agreement protocol, and encryption type.
Asymmetric encryption algorithm.
Allows two parties to securely agree on a symmetric key via a public channel
Type of key exchange that is secure. If an attacker sniffs the whole conversation, they still can’t obtain the key.
Elliptic Curve Cryptography
Type of encryption. Uses discrete logarithms. Asymmetric encryption.
Stronger than factorization based encryption methods. Uses less computational power, and smaller key for equal strength.
Asymmetric and Symmetric tradeoffs
Asymmetric - slower, weaker on equal sized keys. Pro no need for preshared key
Both types are often used together Symmetric - faster, weak due to pre-shared keys.
Hash Functions
Encryption using algorithm, does not have a key. One Way. Impossible to reverse. Variable length plaintext is hashed into a fixed length hash
Collisions
This is what happens if two separate, and non-identical inputs to a hash algorithm result in identical hashes.
MD5 Acronym and type
Message Digest 5, hashing algorithm.
SHA-1 Acronym and type
Secure Hash Algorithm, hash
SHA2-224/SHA3-224SHA2-256/SHA3-256SHA2-384/SHA3-384SHA2-512/SHA3-512 lengths
Length of hash value is in the name.
HAVAL acronym and type
Hash of variable length. Hash
Brute force
attempts every possible valid combination for a key or password.
Known Plaintext
In the known plaintext attack, the attacker has a copy of the encrypted message along with the plaintext message used to generate the ciphertext (the copy).
If I know an input and output. I can potentially guess a key.
Chosen Plaintext and adaptive chosen plaintext
In this attack, the attacker obtains the ciphertexts corresponding to a set of plaintexts of their own choosing. This allows the attacker to attempt to derive the key used and thus decrypt other messages encrypted with that key.
analyst chooses plaintext to be encrypted.Analyst then changes further rounds of encryption based on previous round
Chosen Ciphertext
In a chosen ciphertext attack, the attacker has the ability to decrypt chosen portions of the ciphertext message and use the decrypted portion of the message to discover the key.
meet in the middle attack
Used to attack algorithms that use only two rounds of encryption.
the attacker uses a known plaintext message. They then encrypt using all possible keys, and decrypt using all possible keys. In this way they can find all possible key pairs, AND all possible cipher texts for the plaintext.
Only takes twice as long as breaking a single round of encryption.
Known Key
Analyst knows something about the key, and can use that to reduce efforts used to attack it.
Side Channel Attacks
Use physical data to break cryptosystem. Monitoring CPU cycles or power consumption used while encrypting/decrypting.
Birthday Attack
Create hash collisions and break the key
Key clustering
When two different symmetric keys run on same plaintext and algorithm produce same ciphertext.
Analogous to collisions in hashing, but in relation to symmetric encryption.
Digital signatures
Method of authentication and non-repudiation.
Process:
- Sender hashes their message, and appends hash to email
- Sender then encrypts entire email using their private key.
- Receiver decrypts message using public key (they now know the sender is authentic - only the sender could have encrypted).
- Receiver then hashes the message on their own - if the hash is the same as appended to the email they know that integrity has been preserved.
HMAC Acronym and length
Hash Message Authentication Code - Variable length hash value
Used to implement a partial digitial signature. Combines hashing and symmetric encryption (full digital signature uses asymmetric).
PKI Public Key Infrastructure Process of key exchange.
leverages all three forms of encryption. Symmetric, asymmetric, and hashing.
- Certificate requestor opens an asymmetric channel w/server to verify identity, and to share symmetric key.
- server accept asymmetric channel. Agree on an ephemeral key.
- Server hashes and encrypt the certificate.
- Recipient decrpypts cert, and checks hash for integrity.
- Recipient checks certificate against the CA.
Cert Authorities
Digitals certs are signed by CAs. They authenticate identity of orgs before issuing a certsMay be private, or public
Cert Revocation lists
Lists revoked certs. Maintained by CAs
IPSec
Suite of protocols to provide cryptographic IPV4 and v6. Used to build VPNs
IPSec primary components of SA’s
Security Associations:
AH - Authentication Header
ESP - Encapsulating Security Payload
ISAKMP
Sub component of IKE. Used to organize and manage the encryption keys that have been generated and exchanged by OAKLYEY AND SKEME. Manages SAs.
IKE
Mechanism of IPsec that manages cryptography keys. Internet key exchange.
IKE Consists of three elements. OAKLEY, SKEME, AND ISAKMP.
AH
Authentication header provides authentication and integrity for each packet of net data. NO CONFIDENTIALITY
ESP
provides confidentiality and integrity by encrypting packet data. Does not provide strong authentication.
IPSec Security Association (ISAKMP)
Security Associations are managed by ISAKMP.
Each SA is a one way/simplex connection used to negotiate ESP or AH Parameters. Each side of the IPSec session transmits and receives using different keys. So, this results in up to 4 SAs in use for a two way communication. Each side has a SA for outgoing and incoming traffic.
SA Identification index
Identifies the SA. 32 bits
ESP Tunnel mode
Encrypts everything
ESP Transport mode
only encrypts data, not IP headers. May use AH to authenticate the un-encrypted headers.
IKE vs ISAKMP
IKE - Encryption algorithm negotiation protocol. Allows both sided to select and agree upon the best encryption that both sides support.ISAKMP - Manages Security Associations.
IKE
Another way to manage key exchanges. Both sides will use IKE to negotiate fastest and highest sec level.
SSL and TLS
TSL succeeds SSL. Commonly used for HTTPS. Encrypted out of the gate. Uses Asymmetric encryption to exchange a key, for a subsequent symmetrically encrypted data session.
PGP
pretty good privacy.
PGP year
1991
PGP
uses web-of-trust instead of cert authority.
S/MIME
Email encryption and authentication
Escrowed Encryption
splits private key into two or more parts. Will only release their part of the key on a court order.
Clipper Chip
Name of tech used in the Escrowed Encryption Standard. Allows backdoor to govt while encrypting voice.
Steganography
Science of hidden communication. Hiding information into other media.
Digital watermaks
encode data in a file. Watermark is probably hidden
Mantrap
Two doors requireing separate authentication to open
Bollard
Post designed to stop a car
Smart card
physical access card containing integrated circuit
tailgating
following an auth person into building w/o providing creds
Perimeter defenses
fence doors, walls, locks
Class 1 gate
residential
class 2 gate
Commercial, general access
Class 3 gate
industrial limited access - loading dock for 18 wheeler
Class 4 gate
restricted access. Prison or airport
Lights
detective and/or deterrant
vigenere cipher
- Vigenère ciphero Polyalphabetico Repeated 26 times to form a matrix
Jefferson disks
o Tommy Jo 36 wooden disks
Caesar cipher
- Caesar ciphero Monoalphabetico Simple substitutiono Rotated 3 times
book cipher and running key cipher
- Book cipher and running key ciphero Use well known texts as the basis for keys
Codebooks
assign codeword for important people/locations/terms
one time pad
o one time pad uses identical paird pads one page is used to encrypte same page to decrypt pages are then discarded, never reused only one mathematically proven to be secure
project VERONA
o Broke KGB encryption in 1940s o KGB used one time padso KGB violated one of the three rules thougho Reused pads.
Hebern Machines and PURPLE
o Class of cryptographic deviceso Large manual typewriter looking devices electrified with rotorso Used through WWII
ENIGMA
doi
SIGABA
o Rotor machine used by US through 1950so More complex and covered weaknesses of the Enigmao Large complex and heavyo Never known to be broken
PURPLE
japanese version of enigma
COCOM
o Coordinating comeittee for multilateral export controls Designed to control export of critical technologies to iron curtain countries
Wassenaar arrangement
o After COCOM endedo Created in 1996o Many iron curtain countries includedo Relaxed restriction on exporting cryptography.
DEA
Data Encryption Algorithm described by DES (Data Encryption Standard)
PKI standard
X.509
CAs and ORAs
Certificate Authority (Issues Certs)Organizational Registration Authority (authenticates client certs)
OCSP
Online Certificate Status Protocol - Replacement for CRL (Cert Revocation Lists). Scales beeter than CRL
CRL
Certificate Revocation Lists
PGP encryption type
Symmetric
RC4, RC5, RC6 encryption type
Symmetric
Rijndael Encryption type
Symmetric
Skipjack Encryption Type
Symmetric
CAST-128 Encryption type
Symmetric
CAST-256 Encryption type
Symmetric
RIPEMD-128 RIPEMD-160 RIPEMD-256 RIPEMD-320 Type and key length
Hashing algorithms. Key length is in the name.
RSA Type
Asymmetric. Used for encrypting and signing data.
ElGamal type
Asymmetrc. Used for transmitting digital signatures, and key exchanges.
IDEA and PGP relationship
PGP (pretty good privacy) uses IDEA (international data encryption algorithm) for symmetric encryption.
Work function/work factor
Way to measure the strength of a cryptography system. Measures the effort in terms of time and/or cost of brute forcing a crypto system.
one-time pad/Vernam cipher
Uses a different substitution alphabet for each letter of the plaintext message.
Implementation Attack
exploits weaknesses in the implementation of a cryptography system. It focuses on exploiting the software code, not just errors and flaws but the methodology employed to program the encryption system
Statistical Attack
A statistical attack exploits statistical weaknesses in a cryptosystem, such as floating-point errors and inability to produce truly random numbers. Statistical attacks attempt to find a vulnerability in the hardware or operating system hosting the cryptography application.
Fault Injection Attack
the attacker attempts to compromise the integrity of a cryptographic device by causing some type of external fault. For example, they might use high-voltage electricity, high or low temperature, or other factors to cause a malfunction that undermines the security of the device.
Side-Channel Attack
Computer systems generate characteristic footprints of activity, such as changes in processor utilization, power consumption, or electromagnetic radiation. Side-channel attacks seek to use this information to monitor system activity and retrieve information that is actively being encrypted.
Timing Attack
Timing attacks are an example of a side-channel attack where the attacker measures precisely how long cryptographic operations take to complete, gaining information about the cryptographic process that may be used to undermine its security.
Man in the middle
a malicious individual sits between two communicating parties and intercepts all communications. They set up two separate encrypted sessions, posing as the legitimate endpoints. Can then see all communications.
Birthday Attack
a malicious individual sits between two communicating parties and intercepts all communications
Replay attack
The replay attack is used against cryptographic algorithms that don’t incorporate temporal protections. In this attack, the malicious individual intercepts an encrypted message between two parties (often a request for authentication) and then later “replays” the captured message to open a new session