Misc Flashcards

1
Q

Modular inverse e.g 3^(-1) mod 7 means solving…

A

3 • x == 1 mod 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Euler phi function phi(n) counts …

A

Number of integers between 1 and n that are relatively prime to n.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Chinese remainder theorem can be used to solve…

A

System of congruences with different moduli

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Substitution cipher is vulnerable to …

A
  1. Frequency analysis attack (analysis of frequency of characters in ciphertext and matching to known letter frequency)
  2. Known plaintext attack (if the attacker knows part of plaintext e.g ‘May this email find you well’)
  3. Chosen ciphertext attack (same as known, achieved through social engineering)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shift cipher is most vulnerable to…

A

Brute force (exhaustive search) because of very small key space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In a One-Time pad, the key must be at least as long as the message.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

4 goals of cryptography

A
  1. Confidentiality (data only to authorized users)
  2. Integrity (guarantee that data is untampered during transmission/storage)
  3. Authentication (sender/receiver are who they claim to be)
  4. Non-repudiation (prevents denial of involvement in transaction with proof of origin or receipt that cannot be disputed, forced accountability)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Passive attacker threatens which goal?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Active attacker threatens which goal?

A

All of them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are pros and cons of symmetric key cryptosystems?

A

Pro: very fast
Cons: key management (ever user pair needs key O(n^2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Kerckhoff’s Principle?

A

Security should only depend on the key itself. Assume attacker knows what algorithm is being used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Square and Multiply used for?

A

Solve a^b mod n for a large exponent b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the concept of diffusion?

A

One character change in plaintext should affect as much ciphertext characters as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the concept of confusion?

A

The key/plaintext shouldn’t relate to ciphertext in a simple way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An affine cipher can be broken with 2 plaintexts.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Solving -21 mod 26 means…

A

Adding 26 to -21 until we get a positive result [0, 25]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RSA is secure under assumption that …

A

Factorization is hard

18
Q

Diffie-Helman is secure under the assumption that …

A

Discrete log problem is hard

19
Q

Rabin cryptosystem is secure under the assumption that …

A

Factorization is hard (factoring large composites)

20
Q

Rabin is secure against passive adversary.

A

True

21
Q

What are timing attacks?

A

By measuring time required to perform decryption, an attacker can figure out the private key

22
Q

Name 2 countermeasures to timing attacks

A
  1. Constant exponentiation time
  2. Random delays
23
Q

2 ways to break RSA without factoring n

A
  1. Low exponent attack
  2. Common modulus attack
24
Q

Describe forward search attack

A

If message space is small, attacker can create dictionary of encrypted messages (since pk is known, encrypt all possible messages and store). When attacker seems a message, it can compare to encrypted and find out the message.

25
Q

RSA and Rabin both susceptible to …

A

Chosen ciphertext attack

26
Q

MAC ensures…. BUT NOT …

A

Authenticity and integrity BUT NOT non-repudiation

27
Q

Purpose of ‘salt’ in hashing?

A

Identical x’s will result in different hashes due to salt

28
Q

Describe offline dictionary attack

A

Attacker retrieves hashed password database, go offline and compute hash (with same algorithm used by system) for common passwords to compare with db records

29
Q

Which is better for confidentiality: H(M) or MACk2(M)

A

MAC because H(M) is unkeyed so attacker can guess M

30
Q

Name 3 adversarial goals:

A
  1. Total break (attacker finds secret for signing, so can forge any signature)
  2. Selective forgery (attacker able to create valid signatures on message chosen by someone else)
  3. Existential forgery (attacker can create a pair message, signature such that the signature of message is valid)
31
Q

Does a Hash provide 1. Integrity, 2. Authentication 3. Non-repudiation. Which type of key is used?

A

Yes to integrity. No to authentication and non-repudiation. Unkeyed.

32
Q

Does a MAC provide 1. Integrity, 2. Authentication 3. Non-repudiation. Which type of key is used?

A

Yes to integrity and authentication, no to non-repudiation. Symmetric keys.

33
Q

Does a Digital Signature provide 1. Integrity, 2. Authentication 3. Non-repudiation. Which type of key is used?

A

Yes to integrity, authentication and non-repudiation. Asymmetric keys.

34
Q

Digital signatures prevent replay attacks

A

False

35
Q

Describe a replay attack

A
  1. Attacker intercepts valid communication
  2. Attacker replays message/request (e.g login attempt, payment authorization, command) at later time to impersonate sender
  3. System treats replayed message as legitimate and performs intended action
36
Q

Rabin and RSA are examples of …

A

Public-key cryptosystems that provide encryption and digital signatures

37
Q

In crowds, jondos know the final destination of messages

A

True

38
Q

In RSA, key setup operations are performed by the sender

A

False

39
Q

Weak collision

A

Given an arbitrary x1, it is hard to find an x2 such that h(x1) = h(x2)

40
Q

Strong collision property

A

There exists no x1 and x2 such that h(x1) = h(x2)