Intro to Cybersecurity Flashcards
4 types of assets
- hardware
- software
- data
- communication links
7 steps of the design process
1) ID assets
2) ID stakeholders
3) ID adversaries
4) define attack surface
5) research each path of attack surface
6) design solutions for each path
7) analyze the proposed solution (effectiveness and whether its worthwhile)
5 components of the NICE Framework
- Identify
- Protect
- Detect
- Respond
- Recover
NICE Framework - Identify
ID your situation (id assets, stakeholders, adversaries, and attack surface)
NICE Framework - Protect
design, analyze, implement and pen test solutions
NICE Framework - Detect
constantly monitor both external and internal signals to allow for timely detection
NICE Framework - Respond
what is the response protocol (what actions do you take) when something is detected
NICE Framework - Recovery
- contain the damage
- assess the damage
- follow a recovery strategy
Equation for Caesar’s Cipher and number of possible keys
c = (m + k) mod 26
26 possible keys
brute force cost for breaking cipher
[#of possible keys * (cost per decryption attempt + cost of verification)] / parallelization factor
Affine Cipher equation and number of possible keys
c = am + b
m = (c-b) * a**-1 mod 26
26 x 12 = 312 because phi(26) = 12 so then there are 26 possible values for b and 12 possible values for a
Shannon’s Principles (3)
- define the objective in a rigorous manner
- determine your assumptions
- prove that your methods satisfy the objective given the stated assumptions
equation and assumptions for one-time pad
c = m (XOR) k
- m and k are encoded in binary
- k is never recycled
- the key is sampled from a uniform random distribution (its truly random)
DES specifications
key size: 56 bits
message size: 64 bit blocks
# of rounds: 16
key size is TOO small susceptible to brute forcing
Meet-in-the-middle attack
for a double DES with keys k1 and k2.
A brute force decryption of m for all possible k1 is done in parallel to a brute force decrpytion of c for all possible k2.
adversary then can verify by looking for where Enc(m, k1) = Dec(c, k2)
Since the encrpytion and decryption are done in parallel, we only get 257 bits of security (2 * 256)