Network Security Flashcards
what is meant by message integrity
sender and receiver want to ensure a message has not altered or been tampered with in transit or afterwards without detection
what is included in a passive attack
eavesdropping or intercepting messages
what is involved in an active attack
actively inserting messages into a connection
which is not easy
what is involved in an impersonation attack
spoof source address of packet
what is involved in hijacking attack
attacker inserting themselves in the middle, both sender and receiver still think they are talking to each other
what is plain text
original data
what is encrypted version of plain text called
ciphertext
encryption function
E(P) = C
decryption function
D(C) = P
for the cryptosystem to function, what must hold
D(E(P)) = P
ie must be able to reproduce the plaintext
does the lenght of the key determine its security
no its algorithm is also a key factor
what is the key space
all the possible values the key can take
encyrption function with key
E_k(P) = C
decryption function with key
D_k(C) = P
why does having a big key space mean more security
sequentially going through every key takes too long
ie. brute force attack not worth it
how do substitution ciphers work
each letter or group of letter is replaced by another group of letters to disguise it
three ways to attack on substitution ciphers
identify commonly occurring characters
commonly occuring bigrams
domain specific buzzwords eg system, login, password
three ways to attack on substitution ciphers
identify commonly occurring characters eg vowels
identify commonly occurring bigrams/digrams eg th, ie
identify domain specific buzz words eg system, login, password etc
does substitution ciphering preserve the order of text symbols
yes
how does vigenere cipher work
26x26 matrix
pick long word as key
use first letter of key to encrypt first letter of plain text
use second letter of key to encrypt second letter of plain text
when last letter of key is used, wrap around
how to break vigenere cipher
know length of key and when rotation happens
how do transposition ciphers work
re order the symbols rather than disguising them
process of transposition cipher
pick a key
write plain text in rows under the key
re order the columns
send in column
how many keys are there in symmetric key encryption
1
all parties share the same key
what is the main problem with symmetric key encryption
sender and receiver must agree to a secret key without anyone else finding out
examples of symmetric key algorithms
DES
triple DES
IDEA
AES
what does DES stand for
data encryption standard
what does a block cipher do
operates on a single chunk of data at a time
why is it important that the output is the same size or smaller than the input
encrypted data should not be bigger than input data
how many stages in DES
19
what is the first stage of the DES
fixed permutation (pbox)
what is the last stage of the DES
exact inverse of first stage permutation
what happens in the penultimate stage of DES
leftmost 32 bits exchanged with rightmost 32 bits
what are the 16 middle stages of DES Called
rounds
what happens in 16 rounds of DES
a version of the key is taken in, only 48 bits are used
old right half becomes new left half
old left half run through mixer with key and XORed with old left half becoming new right half
how long would it take to attack a key space of key length 52 bits by brute force
2^56 tries
how to improve DES to make it more secure
Triple DES or 3DES
making use of 2 or 3 keys
what is the problem with the fact that ECB independently ciphers blocks
determinisitic manner
encrypting independently is a lot of work
want some dependency between blocks that we encrypt
what is meant by a probabalistic output
the output should always be different even if the same data is put in
what does CBC stand for
cipher block chaining
how does cipher block chaining work
pass in plaintext
and initialisation vector
XOR initialisation vector with plaintext
XOR of this goes into box with key
this results in ciphertext
that ciphertext becomes initialisation vector for next block
so everything is now chained