EXAM 1 Flashcards

1
Q

What is ciphertext

A

Message after transforming it with encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Encryption?

A

Converting plaintext to ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Decryption?

A

Restoring plaintext from ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Cipher?

A

The algo that can take plaintext and convert it to ciphertext, (it goes both ways)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Cryptanalysis?

A

The science of breaking ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Cryptology?

A

Cryptography + Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are encryption algorithms classified?

A

How do they convert plaintext to ciphertext
How many keys they require
How do they process the plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do substitution ciphers work?

A

Replacing elements of plaintext, with elements of ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do Transposition ciphers work?

A

Shuffle the elements of the plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do Product Ciphers work?

A

Combine Substitution, and Transposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Symmetric Encryption?

A

Single key used for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Asymmetric (public Key) cryptography?

A

Two-keys, one is used for encryption, the other is used for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Asymmetric (public Key) cryptography is commonly used for…

A

session key distribution, and digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between a block and stream cipher?

A

Stream does 1 by 1, block does multiple at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the security requirements for secure symmetric key cryptography?

A
  1. Strong encryption algorithm,
  2. Assumption that attacker knows knows the encryption algorithm
  3. Trusted third party, to distribute the key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Kerckhoff’s Principle?

A

Everything must remain secure even if the attacker knows everything EXCEPT the secret key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

If an attacker finds, a secret message and modifies it what violation is it?

A

Integrity violation, Data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Data Integrity?

A

Assurance that data received is sent by someone trusted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is origin integrity

A

The source of the data is trustworthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is DAD?

A

Disclosure, Alteration, Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What three main aspects of security does ITU-T X.800 consider?

A

Services
Attacks
Mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a Passive attack?

A

An attack that does not involve the modification of systems or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What types of passive attacks are there?

A

Eavesdropping
Traffic Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How do we protect against traffic analysis?

A

Traffic padding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Why are passive attacks so difficult to detect?

A

They don’t involve any kind of tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are types of active attacks?

A

Masquerade - Pretending to be someone else
Replay - Data transmission gets repeated or delayed
Message Modification
Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is an active attack?

A

An attack that modifies systems or data

28
Q

What is Traffic padding?

A

Putting bits into gaps in a data stream to make it difficult to figure out the amount of traffic

29
Q

What are the three main elements of network security?

A
  1. algorithm for security transformation
  2. Generate secret keys
  3. Distribute and share keys
30
Q

What is the difference between the internet and the Web?

A

A web is a protocol.

The internet refers to the entire infrastructure

31
Q

What is a protocol?

A

A set of rules that govern communication

32
Q

What is the primary objective of data classification? How does it relate to cryptography?

A

Securing data based on assigned level of importance and sensitivity it relates because Cryptography is used a defense mechanism for data

33
Q

What is FIPS-140? What does it provide?

A

set of standards for designing and implementing modules that defend sensitive / classified data

34
Q

For what type of government systems was FIPS-140 compliance designed for?

A

It was designed for data that is sensitive but unclassified

35
Q

Describe the Top-Secret data category. What type of data does it contain?
Give examples.

A

Nuclear secrets, locations of space satellites

36
Q

Give some examples of FIPS-140 requirements

A

Finite State model
Physical Security
Operational Environment

37
Q

What is the difference, between brute force and cryptanalytic attack?

A

Brute force tries every possible key, Cryptanalytic uses nature of algorithm AND some knowledge of the plaintext

38
Q

what is a chosen-plaintext
attack?

A

Attacker can encrypt any plaintext using the target encryption scheme.

39
Q

What is ciphertext-only attack?

A

Stat techniques to discover the key or plaintext

40
Q

what is a known-plaintext attack?

A

Has access to the cipher text and knows some properties of the plaintext

41
Q

Describe the requirements and the basic building blocks of public cryptography

A

Two keys, public and private. Encrypt with public and use private to decrypt.

42
Q

Is public key cryptography inherently more secure than symmetric key cryptography

A

No, public key is less efficient

43
Q

What is the difference between the RSA and EC approaches to public key cryptography?

A

RSA is based on the difficulty of factoring large primes

EC is based on Elliptical curves over finite fields

44
Q

What is the Elliptic Curve Discrete Logarithm Problem (ECDLP)?

A

Find K given P and Q, on a curve where Q = kP

45
Q

How can quantum cryptography theoretically threaten the security of public key schemes
such as RSA?

A

Quantum computers in theory are able to solve RSA fast

46
Q

What is a hash function?

A

one way function that takes a message and produces a fixed-size output

47
Q

What is a hash function used for?

A

Used for message integrity, and Digital Signatures

48
Q

What are the security requirements of the hash function?

A
  1. Can work with any sized M
  2. Produces fixed length output
  3. Easy to compute hc
  4. No repeating hash values
49
Q

Describe the basic premise of a Birthday attack and be able to do simple probability
calculations.

A

2^(n/2) give you 50% chance to find a match

50
Q

How can the Birthday Paradox be used to crack hashes?

A
  1. Generate 2^(n/2) random messages
  2. Do any two messages produce the same hash?
  3. Hash detected
  4. If not go back to step 1.
51
Q

What is the difference between a hash function and a MAC?

A

input is variable sized, One way function that computes the digest BASED ON a Secret Key,

52
Q

Compare and contrast symmetric cryptography and a MAC function.

A

Symmetric: Length of plaintext varies so does length of cipher text

Mac function always gives a digest of the same length, and are non invertible.

53
Q

Why do we (ideally) need both link and end-to-end encryption?

A

Data is always protected, and our headers are still protected on the link

54
Q

What is symmetric key distribution? Why is it important?

A

changing keys every time you start a new session, incase the previous was compromised

55
Q

Explain the key hierarchy

A

Decentralized: each person needs a master key

Centralized: Trusted third party only need N mater keys.

56
Q

Why use symmetric master keys to distribute session keys?

A

It’s a good idea to change session keys with every session

57
Q

What are key components of Symmetric Needham-Shroeder Key Distribution protocol

A

A Asks, KDC Shares, A Forwards, B Responds, A Confirms.

58
Q

Why does KDC echo Alice’s message in step (2)?

A

So Alice knows the session key is for her session with bob and it also has a Nonce

59
Q

How does the protocol use nonces
and time stamps to prevent replay attacks?

A

if checks if any nonces have been used before

60
Q

Is Alice able to decrypt entire message from the KDC? Explain

A

No, she can only decrypt the first part that used her master key

61
Q

What are the advantages of using a hierarchy of KDCs?

A

It reduces the load of any single KDC

62
Q

Assume a key distribution scheme where Bob and Alice both share the
symmetric master key MBA. To distribute the session key Alice generates the session
key KS encrypts it using MBA and sends the message IDA || E(MBA,KS).

A

Vulnerable to a replay attack, no nonce or timestamp

63
Q

Why use public key cryptography to distribute session keys? That is, why not just use public key encryption to send bulk data?

A

Public key cryptography is too slow.

64
Q

Consider the Merkle Simple Key Distribution protocol. Is it secure? If
so, explain how so and if not so, explain the flaw.

A

Not secure, There is no public key authenticity

65
Q

Explain how distribution of symmetric keys using public keys can be combined with the
Symmetric Key Needham Shroeder protocol for greater efficiency.

A

Use secure public to distribute master keys.

After master keys are distributed use Needham to distribute session keys, we don’t need public until we give out master keys again