Network Security Flashcards
What is the goal of confidentiality in network security?
The goal of confidentiality is to ensure that only the sender and intended receiver can understand the message contents. This is typically achieved through encryption by the sender and decryption by the receiver.
What is authentication in the context of network security?
Authentication is the process by which the sender and receiver confirm each other’s identities to ensure that communications are secure and trustworthy.
Describe a passive attack in network security.
A passive attack involves monitoring the traffic being sent to try to learn secrets, like eavesdropping or snooping, without the user’s knowledge. It is difficult to detect.
What is meant by message integrity in network security?
Message integrity refers to the measure taken to ensure that a message is not altered in transit or after receipt without detection.
What is a denial of service attack?
A denial of service (DoS) attack aims to make resources (like a server or bandwidth) unavailable to legitimate traffic by overwhelming the resource with bogus traffic.
What is symmetric key cryptography?
In symmetric key cryptography, both the sender and receiver share the same secret key, which is used both to encrypt and decrypt messages.
What is the Data Encryption Standard (DES)?
DES is an influential symmetric-key encryption algorithm developed in the early 70s that uses a 56-bit key and processes 64-bit plaintext blocks through a series of operations.
What replaced DES and why?
The Advanced Encryption Standard (AES) replaced DES because it provides stronger security through longer key lengths (128, 192, or 256 bits) and is efficient in processing data in 128-bit blocks.
What is AES and its significance?
AES (Advanced Encryption Standard) is a symmetric-key NIST standard that replaced DES. It is used globally and was adopted by the U.S. government due to its robust security features that render brute force decryption impractical with current technology.
What is public key cryptography?
Public key cryptography is an encryption method where the sender and receiver do not share a secret key. Instead, each participant has a pair of keys: a public key known to everyone and a private key known only to the recipient of the messages.
What are the main components of a public key encryption system?
In a public key system, there are two main components: an encryption algorithm that uses a public key and a decryption algorithm that uses a corresponding private key.
How does RSA encryption work?
RSA encryption involves choosing two large prime numbers, computing their product (n), and a totient (z). A public exponent (e) and a private exponent (d) are then determined. The public key is (n, e) and the private key is (n, d). To encrypt a message (m), compute c = m^e mod n. To decrypt, compute m = c^d mod n.
What is the significance of the modulus operation in RSA?
The modulus operation ensures that the calculations of encryption and decryption stay within manageable bounds and are computationally feasible even for very large numbers.
Why is it difficult to break RSA encryption?
Breaking RSA encryption typically requires factoring a very large number (n), which is the product of two large primes (p and q). Factoring such a large number is computationally intensive and currently infeasible with conventional technology, making RSA secure.
How are symmetric keys used in conjunction with public key cryptography in practice?
Due to the computational intensity of public key operations, they are often used to exchange a symmetric session key securely. Once both parties have the symmetric key, they switch to the faster symmetric key cryptography for regular communications.