Lecture 12-Anonymous Communication, Cryptocurrencies Flashcards
Review: What does IP authentication header protocol support?
authentication and integrity
Review: What does Encapsulating Security Protocol do?
Authentication and encryption
What is Wired Equivalent Privacy (WEP)?
Symmetric shared key authentication for protecting wireless traffic (not safe)
WPA2
better than WEP, having a separate authentication server is a good thing because it could offer authentication for different points
EAP (Extensible Authentication Protocol)
Allows client and Authentication server to mutually authenticate each other and do 4 key exchange (Part of TLS)
How is WPA2 better than WEP?
Uses CBC-MAC and AES instead of RC4
Onion Routing
Supports anonymous communication over a computer network. Bounces around the communication before reaching endpoint (encrypted IP header)
How do you send response back with onion routing?
Each router has IP and ID of previous location so it sends it back there and is re-encrypted in the onion manner as it goes back
Tor
2nd generation onion router
-overlay consisting of entry guard, middle relay, and exit relay
It’s encrypted in this overlay and is not encrypted once it goes to destination
What is a hidden service?
Tor allows people to connect to a service without revealing the service’s IP address
How do Tor clients find a hidden server?
Bob uses 3 introduction points to advertise himself. Alice will use rendezvous point to connect (lot of latency)
Does Tor have perfect forward secrecy?
Yes, it refreshes public keys for every session so no prior information can be hacked.
How are bitcoin transaction anonymous?
The public key which identifies a person is hashed
Double Spending
When alice sends the same check to two people at the same time so that both of them give their goods
How is double spending prevented?
Transactions get voted on to decide which one is valid if this happens