Midterm 1 Study Guide Flashcards

1
Q

What are the goals of cryptography?

A

Access Control (authentication, authorization)
Confidentiality
Integrity
Non-repudiation
Forward secrecy (session key secrecy will not be compromised)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some real world applications in cryptography?

A

Defense in depth
Security minded (healthy paranoia)
Use public algorithms, hardened implementations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which cryptographic algorithms are considered “secure” today?

A
AES
RSA
SHA-2
SHA-3
SHA-256
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Kerckhoff’s Principle?

A

A cryptosystem should be secure even if everything about the system, except the key, is public knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the requirement for strong symmetric encryption?

A

Strong/safe key exchange and storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Reasons to pad?

A

To fit the size requirement of a block cipher

Prevents weaknesses in RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name the authentication encryption modes. Which is best?

A

Encrypt and MAC
Encrypt then MAC
MAC then Encrypt

The best in encrypt then MAC, so the first things a receiver does is validate the MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name the characteristics of a good hash function

A

Cannot find a collision (no two inputs produce the same output)
The hash value is determined by the data being hashed
The hash function uses all the input data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the types of hash attacks?

A

Pre-image attack – given a hash output, find another hash output that matches (2^n)
Collision attack – find any two hashes that collide (2^(n/2)) (Checks all outputs against all other outputs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are hashes used for in cryptography?

A

To verify the validity of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the use of MAC/HMAC?

A

Integrity and authentication

Does not provide confidentiality or non-repudiation by itself (not used to hide messages but to verify they haven’t been tampered with)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the length extension attack.

A

An attack against a hash algorithm where padding is appended to the end of some ciphertext. SHA1 for example. The state of bytes in SHA1 is changed from the original to the intercepted MAC so as to continue the hashing algorithm where it left off. The padding must be added to the original message as it would be before encryption, and a new message appended after that. Recreating the padding is like pretending the padding is part of the actual message. Then the appended part is also seen as valid, and the algorithm adds its own padding onto that. The MAC created from the fake message will match the MAC sent to the receiver, so it will appear valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does HMAC prevent a length extension attack?

A

It doesn’t just find H(k, text). It find H(k, h(k, text)). This addition requires knowledge of the key, which an attacker does not have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the recommended secure implementation of a MAC from NIST?

A

SHA3 something something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is 65537 used for e in RSA?

A

It is just one more than a 2^n number, so it is easy to compute. It is also a relatively large prime number, which is enough to be safe for the algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly