Module 16 Flashcards
four elements of secure communications:
data integrity
origin authentication
data confidentiality
data non-repudiation
Guarantees that the message is not a forgery and does actually come from whom it states. Many modern networks ensure authentication with algorithms such as hash-based message authentication code (HMAC).
Origin Authentication
Guarantees that the message was not altered. Any changes to data in transit will be detected. Integrity is ensured by implementing either of the Secure Hash Algorithms (SHA-2 or SHA-3).
The MD5 message digest algorithm is still widely in use. However, it is inherently insecure and creates vulnerabilities in a network. Note that MD5 should be avoided.
Data Integrity
Guarantees that the sender cannot repudiate, or refute, the validity of a message sent. Nonrepudiation relies on the fact that only the sender has the unique characteristics or
signature for how that message is treated.
Data Non-Repudiation
Guarantees that only authorized users can read the message. If the message is intercepted, it cannot be deciphered within a reasonable amount of time. Data confidentiality is
implemented using symmetric and asymmetric encryption algorithms.
Data Confidentiality
__ are used to verify and ensure data integrity.
Hashes
is based on a one-way mathematical function that is relatively easy to compute, but significantly harder to reverse.
Hashing
a hash function takes a variable block
of binary data, called the message, and
produces a fixedlength, condensed representation, called the hash.
The resulting hash is also sometimes called the message digest, digest, or digital fingerprint.
With hash functions, it is computationally infeasible for two different sets of data to come up with the same hash output.
True
Cryptographic hash values are often called
“digital fingerprints”.
the equation h= H(x) is used to
explain how a hash algorithm operates.
are used to ensure the integrity of a message. They help ensure data has not accidentally changed and that what was sent is indeed what was received.
Hash functions
There are four well-known hash functions:
- MD5 with 128-bit digest
- SHA-1
- SHA-2
- SHA-3
While hashing can be used to detect accidental changes, it cannot be used to guard against
deliberate changes that are made by a threat actor. Therefore, hashing is vulnerable to ____ and does not provide security to transmitted data.
man-inthe-middle attacks
To provide integrity against man-in-the-middle attacks, origin authentication is also required.
To add origin authentication and integrity assurance, use a ___ uses an additional secret key as input to the hash function.
keyed-hash message authentication code
(HMAC). HMAC
an HMAC is calculated using any cryptographic algorithm that combines a cryptographic hash function with a secret key. Hash functions are the basis of the protection mechanism of HMACs.
Only the sender and the receiver know the secret
key, and the output of the hash function now depends on the input data and the secret key. Only parties who have access to that secret key can compute the digest of an HMAC function. This defeats man-in-themiddle attacks and provides authentication of the data origin.
True
is often considered the most difficult part of designing a cryptosystem.
Key management
there are several essential characteristics of key management to consider.
Key generation
Key verification
Key exchange
Key storage
Key lifetime
Key revocation and destruction
It was up to Caesar to choose the key of his cipher. The Vigenère cipher key is also chosen by the sender and receiver. In a modern cryptographic system, ___ is usually automated and not left to the end user. The use of good random number generators is needed to ensure that all keys are equally generated so that the attacker cannot predict which keys are more likely to be used.
Key generation
Some keys are better than others. Almost all cryptographic algorithms have some weak keys that should not be used. With the help of key verification procedures, weak keys can be identified and regenerated to provide a more secure encryption. With the Caesar cipher, using a key of 0 or 25 does not encrypt the message, so it should not be used.
Key verification
Key management procedures should provide a secure key exchange mechanism that allows secure agreement on the keying material with the other party, probably over an untrusted medium.
Key exchange
On a modern multi‐user operating system that uses cryptography, a key can be stored in memory. This presents a possible problem when that memory is swapped to the disk, because a Trojan horse program installed on the PC of a user could then have access to the private keys of that user.
Key storage
Using short key lifetimes improves the security of legacy ciphers that are used on high‐speed connections. In IPsec a 24‐hour lifetime is typical. However, changing the lifetime to 30 minutes improves the security of the algorithms.
Key lifetime
__ notifies all interested parties that a certain key has been compromised and should no longer be used.
Key revocation
__ erases old keys in a manner that prevents malicious attackers from recovering them.
Key destruction
Two terms that are used to describe keys are:
- Key length
- Keyspace
Also called the key size, this is the measure in bits. In this course, we will use the term key length.
key length
This is the number of possibilities that can be generated by a specific key length
keyspace
AES type of algorithm
symmetric
The __ of an algorithm is the set of all possible key values. A key that has n bits produces a keyspace that has 2n possible key values. By adding one bit to the key, the keyspace is effectively doubled.
keyspace
The rule “the longer the key, the better” is valid, except for possible performance reasons.
Shorter keys equal faster processing but are less secure. Longer keys equal slower processing
but are more secure.
True
such as Data Encryption Standard (DES), 3DES, and Advanced Encryption Standard (AES) are based on the premise that each communicating party knows the pre-shared key.
Symmetric encryption algorithms
Data confidentiality can also be ensured using ___, including Rivest, Shamir, and Adleman (RSA) and the public key infrastructure (PKI).
asymmetric algorithms
use the same pre-shared key to encrypt and decrypt data. A pre-shared key, also called a secret key, is known by the sender and receiver before any encrypted communications can take place.
Symmetric algorithms
Symmetric encryption algorithms are sometimes classified as either
a block cipher or a stream cipher.
transform a fixed-length block of plaintext into a common block of ciphertext of 64 or 128 bits.
Common ___ include DES with a 64-bit block size and AES with a 128-bit block size.
Block ciphers
encrypt plaintext one byte or one bit at a time. ___ are basically a block cipher with a block size of one byte or bit. Stream ciphers are typically faster than block ciphers because data is continuously encrypted.
Stream ciphers
Well-known symmetric encryption algorithms are
Data encryption standard (DES)
3DES (triple DES)
Advanced encryption standard (AES)
Software-optimized encryption algorithm (SEAL)
Rivest ciphers (RC) series algorithms