IT-Security (Chapter 4) Flashcards

1
Q

Pseudonym Types

A
Person pseudonym
Role pseudonym
Relationship pseudonym
Role-relationship pseudonym
Transaction pseudonym
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Basics Techniques for Data Minimization

A

Anonymous Communication
Controlled Disclosure
Privacy enhanced ID Management Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anonymity

A

Anonymity of a subject means that the subject is not identifiable within a set of subjects, the anonymity set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Global Attacker

A
  • Observes all communication

* Observes some nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Local Attacker

A
  • Observers some communication

* Observes some nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Implicit address

A

If message is directed to someone, it must contain an attribute so that recipient knows it is directed to him

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explicit address

A

describes specific place in a network to which message should be delivered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mix

A
  1. Collects messages,
  2. Deletes duplicates,
  3. Re-Codes,
  4. Shuffles,
  5. Forwards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pool mixes

A

Buffer (storage space) for n messages

  1. Wait until n messages received
  2. Select a message randomly and forward it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Batch mixes

A
  1. Fills up a buffer of size n

2. Send all n messages together but in random order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the anonymity set size

A

Pool: number of messages
ever forwarded by mix at time t
Batch: batch size n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cascades: (Jondos)

A
analytical easy to understand
−anonymity set = batch size
all communication can be observed
−high traffic servers
−practical implementations of servers are imperfect
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mix Nets (TOR)

A

less infrastructure needed
low traffic per node
lower assumptions about the servers
−hard to analyze (what is the anonymity set size?)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DC Net

A
  1. Toss a coin per neighbor (crown 0, head 1)

2. Broadcast XOR of all neighbor coins XOR your secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly