Lecture 1 & 2 Flashcards

1
Q

What does Encryption achieve?

A

Makes data incomprehensible to preserve its confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a cipher?

A

The algorithm used by encryption when encrypting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is meant by Pre-Image resistance in Cryptographic Hash Functions?

A

If given the output of a hashfunction, is should be very hard to find the input of the hashfunction. Given a hash h, it should be hard to find m such that
h = H(m)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a adversary model?

A

Is a generalization of any attack(er) with specific capabilities and computational power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a threat model?

A

What adversaries and properties to care about

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the Kerckhoff’s Principle state?

A

“A cryptosystem should be secure even if everything is known about the system / scheme except for the key.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is something if it is computationally secure?

A

To attempt to solve by bruteforcing is impossible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is meant by Second Pre-Image resistance in Cryptographic Hash Functions?

A

If a input message is given, and creates a hash, it should be very hard to find another input message that gives the same hash. Given input m1, it should be hard to find a distinct m2 such
that H(m1) = H(m2), they yield the same output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is cryptology?

A

The study of how to hide messages or how to secure communication against adversaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cryptology can be defined in two parts. What are these parts, and what do they imply?

A

Cryptography – How to construct cryptographic systems

Cryptanalysis – How to break cryptographic systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is meant by Collision resistance in Cryptographic Hash Functions?

A

It should be hard to find any two distinct m1 and m2 such
that H(m1) = H(m2). Attacker is not given a message m1 or m2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

There are two types of security, what are these types and what do they imply?

A

Unconditional – Information-theoretically secure (impossible to break – impractical)

Computational – Broken with enough computation, but not within “reasonable” time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Symmetric encryption keys are between what size (in bits)? For example, between 1-2.

A

128 - 256 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe Symmetric Encryption

A

Symmetric encryption is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic data. The entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the avalanche effect?

A

Small change in input, large change in output in hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does MAC need to produce a tag/MAC?

A

A secret key sk and a message m

17
Q

What three parts are in an encryption scheme?

A

Plaintext – A message m you want to encrypt

Algorithms – An encryption algorithm “Enc” and decryption algorithm “Dec”

Key – A secret key sk

18
Q

Describe Semantic Security and its key factors

A

An encryption scheme is semantically secure, if an adversary cannot guess with better probability than 1/2 whether the given ciphertext is an encryption of message m0 or m1

19
Q

Encryption and decryption oracles definitions

A

Encryption Oracle: Send a message, get the ciphertext back

Decryption Oracle: Send a ciphertext, get the message back

20
Q

How can MAC be used to provide authenticity and integrity?

A

By using the secret key along with the tag (MAC). The receiver who knows the secret key can then see the message.

21
Q

What are the two types of algorithms for randomization?

A

Deterministic: The same input always produces same output

Probabilistic: The same input produces different output

22
Q

What does HMAC improve over regular MAC?

A

It introduces keyed-Hashing

23
Q

Randomization of algorithms can be…. what?

A

Implicit: Probabilistic algorithm
Explicit: Deterministic algorithm

24
Q

What is a nonce?

A

A WEE PEEEEDO

25
Q

What do you do if the secret key is too short or too long in the HMAC?

A

Too short: Pad it with zeroes
Too long: hash it?

26
Q

What is a nonce? For real this time you know waddaimsaying

A

A number used once (distinct), ensures non-similar encryption output, can be of any length

27
Q

Why is password hashing often not enough? What’s a solution to improve the security?

A

Hash algorithms are too fast, making it easy to brute force all hashes.

Solution: Salting the passwords

28
Q

What is Initial Value?

A

Initial value (IV)^3 has to be distinct and unpredictable (for the adversary), is a random and unique value mixed with the encryption to prevent patterns from emerging

29
Q

What does salting a password do?

A

It adds a random value when calculating the password hash. So there’s now both the hash and the salt connected to the users password and username.

30
Q

What does password salting force the attacker to do which they didn’t have to do earlier?

A

Target a specific person, they cannot attack all persons at the same time. They need to try a salt value on all the hash-values.

31
Q

What is IND-CPA and IND-CCA?

A

IND-CPA (Indistinguishability under Chosen-Plaintext Attack):
Focus: Security property for encryption schemes.
Scenario: Adversary can choose plaintexts and receive corresponding ciphertexts.
Goal: Adversary cannot reliably distinguish ciphertexts of different chosen plaintexts.

IND-CCA (Indistinguishability under Chosen-Ciphertext Attack):
Focus: Stronger security property for encryption schemes.
Scenario: Adversary can obtain decryption of chosen ciphertexts, excluding a target ciphertext chosen after encryption.
Goal: Adversary, even with access to encryption and decryption oracles, cannot reliably distinguish the encryption of the target ciphertext from a random string.