Lecture 5 Flashcards

1
Q

What is Message Authentication?

A
  • Is a piece of information used to authenticate a message
  • Protects against active attacks
  • Verifies that a message is authentic
  • Contents is not altered– comes from a reliable source
  • Timely and in a correct sequence
  • Receiver performs same computation on message and checks that it matches the MAC
  • Only sender & receiver share a key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hash Function Requirements

A
  • A group of characters (keys) that maps onto a hash value and compares it to a the receiver with the message.
  • If both hash values are the same, the message is authenticated.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Two approaches to attacking a secure hash function and the additional secure hash function applications

A
  1. Cryptanalysis

Exploits logical weakness in an algorithm

  1. Brute-Force attack

Strength of hash function depends on the length of the hash code produced

Additional secure hash function applications:

  • Passwords
  • Hash function stores is the OS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Public-Key Encryption Structure?

A
  • Based on mathematical functions
  • Asymmetric
  • Uses two separate keysPUBLIC and PRIVATE
  • Public made “public” for others
  • Protocol needed: **Key distribution **
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Public key 6 ingredients of Asymmetric

A

Plaintext – Readable message fed into the algorithm

  • *Encryption algorithm** – Transformation from plaintext
  • *Public** and
  • *Private key** – Pair of keys for encryption and decryption
  • *Ciphertext** – Scrambled message produced as an output
  • *Decryption algorithm** – produces the original plaintext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Requirements of public-key Cryptosystems

A
  • Computationally easy to create key pairs
  • Sender knowing the public key to encrypt messages
  • Receiver knowing the private key to decrypt ciphertext
  • Computationally infeasible
  • For opponent to determine the private key from public key
  • For opponent to **recover original message **
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetric Encryption Algorithm

A
  • Enables two users to securely agree about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages
  • Limited exchange of the keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Digital Signature Standard and Elliptic Curve Photography?

A

Digital Signature Standard (DSS)

Provides a digital signature function

Cannot be used for encryption or key exchange

Elliptic Curve Photography (ECC)

Security like RSA but with smaller keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Digital Signature?

A
  • is a mathematical technique used to validate the authenticity and integrity of a message/source
  • Attach a code that acts like a signature
  • Identity of an electronic document/message** **and acknowledging the signer for consent
  • Encrypts hash code with private key
  • Does not provide confidentiality
  • When there is a complete encryption
  • Message is safe from **alteration **
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital Envelops

A
  • Does not require having the same key to protect a message arranged by the sender and receiver
  • Equates to the same as “sealing an envelope containing a unsigned letter
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Random Numbers

A

Uses generation of:

  • Keys for public-key
  • Stream key for symmetric stream cipher
  • Symmetric key used as a temporary session key or creating a digital envelope
  • Handshaking to prevent replay attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

andom VS Pseudorandom

A

Cryptographic applications make use of algorithmic techniques for random number generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Pseudorandom?

A
  • Sequences to produce to satisfy the statistical randomness tests
  • Likely to be predicable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is aTrue Random Number Generator?

A
  • Uses nondeterministic source to produce randomness
  • Operates by measuring unpredictable **natural processes **
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Practical Application of encryption

A
  • : Encryption of stored data
  • Common to encrypt transmitted data
  • Less common for encryption
  • There is little protection beyond domain authentication and OS access controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Approaches to encrypt stored data

A
  • Uses commercially available encryption package
  • Black-end appliance
  • Library base encryption
17
Q

List and describe three approaches to message authentication

A
  • Message encryption
  • Message authentication code
  • Hash function
18
Q

What properties must a hash function have to be useful for message authentication?

A
  • Can be applied to a block of data of any size
  • Produces a fixed-length output
  • H(x) is easy to compute for a given x
19
Q

How can public-key encryption be used to distribute a secret key?

A
  • An approach is for the sender to encrypt a

secret key with the recipient’s public key.

20
Q

Three ways in which a message can be authenticated using hash code

A
  1. Message can digest encryption using Symmetric Encrytion
  2. Can digest using public-key encrytion
  3. Using hash function but no encryption for message authentication