Lecture 12-Anonymous Communication, Cryptocurrencies Flashcards

1
Q

Review: What does IP authentication header protocol support?

A

authentication and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Review: What does Encapsulating Security Protocol do?

A

Authentication and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Wired Equivalent Privacy (WEP)?

A

Symmetric shared key authentication for protecting wireless traffic (not safe)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WPA2

A

better than WEP, having a separate authentication server is a good thing because it could offer authentication for different points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

EAP (Extensible Authentication Protocol)

A

Allows client and Authentication server to mutually authenticate each other and do 4 key exchange (Part of TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is WPA2 better than WEP?

A

Uses CBC-MAC and AES instead of RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Onion Routing

A

Supports anonymous communication over a computer network. Bounces around the communication before reaching endpoint (encrypted IP header)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do you send response back with onion routing?

A

Each router has IP and ID of previous location so it sends it back there and is re-encrypted in the onion manner as it goes back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tor

A

2nd generation onion router
-overlay consisting of entry guard, middle relay, and exit relay
It’s encrypted in this overlay and is not encrypted once it goes to destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a hidden service?

A

Tor allows people to connect to a service without revealing the service’s IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do Tor clients find a hidden server?

A

Bob uses 3 introduction points to advertise himself. Alice will use rendezvous point to connect (lot of latency)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Does Tor have perfect forward secrecy?

A

Yes, it refreshes public keys for every session so no prior information can be hacked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How are bitcoin transaction anonymous?

A

The public key which identifies a person is hashed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Double Spending

A

When alice sends the same check to two people at the same time so that both of them give their goods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is double spending prevented?

A

Transactions get voted on to decide which one is valid if this happens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How are transactions verified?

A

Merkle tree. Only need a few transactions to verify the hashes and blockchain stores chained hashes of every transaction ever

17
Q

Proof of work

A

The competition to find the hash with the correct number of prepending zeros in order to mine a block (gets rewarded in bitcoin)

18
Q

What is a limitation that actually could help prevent double spending?

A

Wait 10 minutes for verification of a transaction (waiting for confirmation)

19
Q

Can your public key be tracked?

A

You can create multiple public keys to keep anonymous but it can be linked together