Lecture 5 Flashcards

1
Q

What’s AEAD?

A

Authenticated Encryption with Associated Data: Associated extra data that should not be encrypted e.g. the IP-address when sending network packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main cherished feature of Authenticated Encryption?

A

When used, we know that the message we receive, is guaranteed to be the one meant for us. We know that when AE is used, the message is unforgeable (unchangeable).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s OCB?

A

Rullpapper (RIZZLA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s the pros and cons with CCM vs. OCB?

A

CCM: No patent issues but slow
OCB: Patent issues but fast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What to look for in crypto libraries? Kanske onödig?

A

High level API
Fast, safe with modern language
Backed and used by big players

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What will quantum computers be able to break?

A

Asymmetric encryption but not symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s Shors’ algorithm, connected to quantum computers?

A

Quantum algorithm to find the prime of big integers. Makes the “hard problem” easy to solve. The hard problem that lay the ground of EC, RSA, DH.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s Grovers’ algorithm, connected to quantum computers?

A

Faster brute-force. It’s difficult to implement in practice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s one community goal for the Post quantum crypto world?

A

Design new primitives (longer key-lengths etc.) to counter the power of QC. Tradeoffs are that all will be longer (keys, ciphertexts …)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the new Diffie-Hellman?

A

KYBER (KOLLA MER)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the basic goals of TLS (Transport Layer Security)?

A

Secrecy (encryption), Integrity (MACs) and server and optional client Authentication (signatures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When should you use authenticated encryption?

A

Always

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

There are two related security notions for symmetric encryption, what are these two? Each of them is the “Integrity of ____”, of what?

A

INT-PTXT: Integrity of plaintext
INT-CTXT: Integrity of ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mention 3 or more general cryptographic libraries

A

OpenSSL
LibreSSL
BoringSSL
GnuTLS
BouncyCastle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mention 2 or more modern libraries (that should be used):

A

Libsodium
NaCl
Tink

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is TLS?

A

TLS, or Transport Layer Security, is a protocol that ensures secure communication over a computer network, such as the internet. It’s a way to protect the data that is being transmitted between two systems from being intercepted or tampered with by unauthorized parties.

Also, the “S” in HTTPS

17
Q

Is TLS used today?

A

Yes, widely. It’s considered the new default.

18
Q

Should we always use Authenticated Encryption?

A

Yes, when possible.

19
Q

Should we always use libraries like libsodium or Tink?

A

Yes, when possible.

20
Q

Should we always use libraries like OpenSSL or LibreSSL?

A

No, use modern libraries if possible.