Lec 5: Authentication and Key Distribution Flashcards

1
Q

What do you use when you want to provide evidence that an object is authentic? What does authentic mean?

A
  • providing evidence that an object is authentic == wanting to provide evidence that an object was endorsed by a particular person
  • you use signatures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do you use when you want to provide evidence that you are who you say you are?

A

authentication protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Consider a paper check used to transfer money from one person to another. What are the properties of the checks and the physical signatures on the checks?

A
  1. Signature confirms authenticity
    - only legitimate signer can produce signature (Arguable)
  2. in case of alleged forgery
    - 3rd party can verify authenticity (arguable)
  3. Checks are cancelled
    - so they can’t be reused
  4. Checks are not alterable
    - or alterations are easily detected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the requirements for digital signatures?

A
  1. a mark that only one principal can make, but others can easily recognize
  2. unforgeable
    - if P signs a message M with signature S{P,M} it is computationally infeasible for any other principal to produce the pair (M, S{P,M})
  3. authentic
    - if R receives the pair (M, S{P,M}) purportedly from P,R can check that the signature relaly is from P
  4. Not alterable
    - after being transmitted, (M, S{P,M}) cannot be changed by P, M, or an interceptor
  5. Not reusable
    - a duplicate message will be detected by the recipient
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do digital signatures with shared keys work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does RSA work (Digital Signatures with Public Keys)

A

RSA is commutative:
- D(E(M, K), k) = E(D(M, k), K)

Opposite from normal use of PK as cipher
◆ Let KA be Alice’s public key
◆ Let kA be her private key
◆ To sign msg, Alice sends D(msg, kA)
◆ Bob can verify the message with Alice’s public key

Works! RSA: (me)d = med = (md)e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the advantages and disadvantages of digital signatures with public keys? What is the Alice and Bob drawing that shows how digital signatures with public keys works?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the variations on public key signatures?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do A and B convince each otehr that they are each A and B?

A
  • cryptographic authentication protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the threat model of communication over a network as it relates to cryptographic protocols?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the general definition of “protocol”?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can the interceptor do?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an arbitrator and how do they affect protocols (arbitrated protocols)?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are real-world examples of arbitrated protocols and what are the issues with arbitrated protocols?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do adjudicated protocols work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do self-enforcing protocols work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Is the shared key digital signature algorithm an arbitrated or adjudicated protocol?

A

arbitrated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Is trusted 3rd party provided authenticity an arbitrated or adjudicated protocol?

A

arbitrated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is public key digital signature algorithm an arbitrated or adjudicated protocol?

A

adjudicated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is trusted 3rd party provided non-repudiation mean? Is it an arbitrated or adjudicated protocol?

A
  • Bob can keep Alice’s digitally signed message
  • adjudicated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the goal of authentication?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the threats to authentication?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What situation would we use shared-key authentication?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How does weak authentication work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a replay attack?
26
What are the three strategies for defeating replay attacks?
27
What are nonces?
28
What are the uses of nonces in a challenge-response protocol?
29
How are time stamps used?
30
What are sequence numbers used for? What are the disadvantages?
31
How does strong(er) shared-key authentication w/ nonces work? What makes it stronger?
32
What is wrong with this flawed version of shared-key authentication?
33
What are the difficulties of protocol design?
34
What are the general principles of protocol design?
35
What are the different types of key establishments? What is the key issue?
36
What is bilateral out-of-band?
37
What is point-to-point?
38
What is third-party key distribution?
39
Explain the Needham-Schroeder Protocol
40
How can a replay attack occur on the Needham-Schroeder Protocol?
41
What are the different attack scenarios of the replay attack on the Needham-Schroeder Protocol?
42
What is Kerberos? What is it used for?
43
Draw the diagram that shows how Kerberos works
44
How does Kerberos login work...in notation terms?
45
How does Kerberos Service Request work..in notation terms?
46
How does Kerberos work in quasi-english?
47
What are the benefits to Kerberos?
48
What are the drawbacks to Kerberos?
49
What do Public Key Infrastructures do?
50
What do Certification Authorities do?
Certification Authority (CA) ◆ Binds identifiers to a public key ◆ Expected to perform some amount of due diligence before vouching for this binding ◆ Popular CA’s: Verisign, Thawte ◆ Note that you must trust CA
51
What is the PKI cErtificate 'X.509'
52
Explain the SSL/TLS example of PKI
53
What to do about SSL/TLS if you want multiple Certificate Authorities (CA)?
54
What happens if a private key is lost or compromised?
55
What is Secure Shell?
56
What are the different way SSH authenticates?
57
How does SSH with passwords work?
58
What is an example use of ssh with password?
59
How does SSH Protocol work?
60
What are the problems with SSH with password?
61
What does ssh.com's SSH and SSH error look like? When does the error come up?
62
How does SSH with client keys work?