Lecture 14-Quantum Flashcards

1
Q

Kerberos vs TLS

A

Kerberos is used for more permanent servers and uses symmetric key encryption. It is not scalable. TLS uses certification chain and scales better.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rare event removal

A

Including a flip flop or extra gate to increase the chances of a rare event happening to test for detection of hw trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Design obfuscation

A

Creating an obfuscated mode where a hw trojan would be invalid and cannot be transferred to the normal mode if it doesn’t know secret key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the point of PCRs?

A

Store hashed concatenated bytes of data (gets rehashed each time new data is appended) So that if one bit gets tampered with, whole hash changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trusted Boot Process

A

Each step from CRTM to user application gets verified using hashes by TPM 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why shouldn’t Endorsement key be used for signatures?

A

Not secure, sensitive date. Instead use Attestation Identity key that is generated anew for each interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to connect TPM to Attestation Identity Key?

A

TPM generates AI key and asks TTP to endorse the key and provide the certification to show to the verifier. The way to prove to TTP is to sign AI key with Endorsement key (only time revealing sensitive information)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Three main functions of TPM

A

Sealed Storage, Remote Attestation, Integrity Measurements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BitLocker

A

Way of full disk encryption and key stored in TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Main issue with TPM?

A

No way to know if it is a truly secure state. (There could be something passive or something broken prior to TPM verifying it)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

QKD: BB84

A

Quantum channel sends out photons and throws out readings that don’t match. Alice and Bob send and receive photons and then share their basis. They then wipe out the bits that don’t match

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Can Eve attack bb84?

A

Yes but if Eve intercepted photons, then Alice and Bob will know because they can detect inconsistencies if a lot of bits get intercepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you ensure an n-bit key?

A

By sending double the number of photons. (Gives Bob the chance to get 50% of it right)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can TLS be improved upon?

A

Use Quantum Resistant public key (generated by bb84 or e91)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly