Exam questions Flashcards
What are the security goals?
- Authentication
- Access Control
- Confidentiality
- Integrity
- Non-repudiation
- Availability
What is the difference between asymmetric and symmetric cryptography ?
symmetric uses same key for encryption decryption, asymmetric uses a key of public/private keys for encryption/decryption respectively.
Symmetric cryptography is often less expensive than asymmetric.
There are also hybrid algorithms such as the one used in TLS and PGP, where a key is shared using asymmetric cryptography, and then the data is transmitted with symmetric cryptography, using the previously shared symmetric key.
How is management of keys done in asymmetric cryptography?
set of 2 keys (public / private)
data sent to bob should be encrypted with the PublicKeyBob, which he distributes to anyone. The ciphered data can only be deciphered using PrivateKeyBob, which should not be shared with anybody.
How are keys managed in PGP?
A random key is encrypted using the public key from the receiver, generating Ck
Explain the RSA algorithm.
dunno
Explain the Diffie Hellaman algorithm?
3^X mod 17
3^Y mod 17
and shit
What are active and passive attacks (and the difference between them)?
Passive
- Eavesdropping: secretly listening to a conversation
- Traffic Analysis: the inference of information from
observation of traffic flows
Active attacks
- Spoofing (Masquerading): the pretence by an entity to be a different entity
- Denial of Service (DoS): prevention or inhibition of the normal use or management of communication facilities
Give an example of an active attack!
DoS
What can be done against a man-in-the-middle attack?
Cryptography
What is so special about Diffie-Hellman. When Alice and Bob both can sign a key, why can’t they just use the public and private key for en-/decryption?
Diffie-Hellman creates a shared secret that was not chosen by anyone. Also, using symmetric cryptography is cheaper.
What is the difference when a private key and a Diffie-Hellman session key leaks?
For Diffie-Hellman, one key is used for one communication.
A private key is used for all communications, therefore, if it leaks, all messages from now one, and even old logged messages can be read.
There are different modes of operation. What are these modes and why are they used?
WHAT?!