NIS Chapter 03 Flashcards

1
Q

what is an unbounded medium?

A

a communication medium which has no inherent physical limitations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

define cipher

A

a process that converts plain text into a ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are symmetric algorithms? Give three examples of such

A

WEP, TKIP, CCMP

A key is shared between both encrypting and decrypting party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is it important to have a secure way of sharing the key?

A

since the key is shared, the key needs to be kept secret otherwise there is no point to the encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is asymmetric encryption ?

A

a type of encryption method that has a private key and a public key. One for encryption and one for decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what technique does a stream cipher use?

A

plaintext is encrypted bit by bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a keystream?

A

This is a psuedorandom cipher bit stream that is combined with the plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is WEP encryption?

A
  • a type of stream cipher
  • that uses the RC4 stream cipher to generate a keystream
  • and uses xor to combine the plain text and generated stream
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a block cipher?

A
  • ## takes in a fixed size length of data and encrypts it to the same length
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is block ciphering a symmetric or asymmetric ciphering scheme?

A

symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the downside of putting a specific block through multiple iterations of encryption in order to increase security?

A

performance will be affected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 2 parts of the RC4 cipher?

A

The PRG and KSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do the 2 parts of the RC4 work together? (4)

A
  • a key is ran through the KS
  • Which produces a state vector
  • state vector is fed into the PRG which permutes/rearranges the vector
  • XOR the resultant with the plaintext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What was the general use case of the RC4 cipher?

A

weak hardware/lazy developers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is RC4 a stream cipher / block cipher?

A

stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What makes RC5 different from RC4? (2)

A
  • variable block, variable and #rounds
  • block cipher instead of stream
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why is the Data Encryption Standard considered insecure>

A
  • small key size
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

4 facts about DES

A
  • block cipher
  • 64 key size
  • 56 effective lenght
  • 16 rounds on each block
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is the difference between DES and 3DES

A

it is essentially DES run 3 different times using 3 keys

20
Q

What are the different key options for 3DES

A
  • all keys are the same, all keys are unique, 2 keys are unique
21
Q

3 facts of AES

A
  • supports 3 key sizes
  • used as a security standard
22
Q

What 3 encryption methods operate in the 2 layer of the OSI model?

A

CCMP, TKIP, WEP

23
Q

What is the structure of 802.11 data frames?

24
Q

What is the payload of an 802.11 data frame reffered to as?

25
Q

What are the 3 intended goal of WEP?

A
  • confidentiality
  • access control through static key
  • data integrity through checksum
26
Q

What is one major similarity between WEP and TKIP?

A

they both use the RC4 cipher

27
Q

What is the purpose of the RC4 cipher in encryption schemes?

A

used to generate a a stream cipher to XOR the plaintext

28
Q

What is an IV in context of WEP?

A
  • a randomly generated bits that are combined with the secret key and used as seeding material for the RC4 cipher
29
Q

What is the difference between ICV and IV

A

ICV is used to check the integrity of of the plaintext, while IV is part of the seeding material for the RC4

30
Q

Draw the WEP encryption process

31
Q

Where is one of the weakness of WEP found concerning IV

A

in IV, a new IV is created for each data frame but there are only so many different IV combinations, that the values end up being reused

32
Q

Name 4 WEP encryption weaknesses

A
  • IV collision attacks
  • Weak key (RC4 generates weak keys)
  • reinjection to accelerate IV collision attack
  • Bit flipping (weak ICV)
33
Q

Why was TKIP created?

A

To serve as a temporary replacement for WEP that wouldn’t need any HW upgrades to implement

34
Q

How does TKIP modify WEP?

A
  • Temporal keys: keys are dynamically allocated via a 4 way handshake instead of a static key
  • Sequencing: uses sequencing in order to avoid reinjection attacks
  • Key mixing: key mixing is used to create stronger seeding material for RC4 which avoids IV collisions
  • has stronger integrity because MIC protects against bit flipping attacks
35
Q

TKIP countermeasures?

A
  • MIC failures are able to be logged so they can be examined
  • 60 second shutdown after 2 MIC failures
  • new temporal keys
36
Q

What is CCMP

A

a security protocol that was designed to replace WEP and TKIP

37
Q

What commonality between TKIP and WEP is different with CCMP?

A

AES is used as a block cipher instead of the RC4 streaming cipher

38
Q

In order to use AES, what must be predefined before encryption begins?

A

the methods for converting between messages and blocks during encryption and decryption or the “mode of operation” needs to be defined

39
Q

How does the ECB mode of operation work?

A
  • each block is encrypted independently and the padding is added as needed.
  • the same block generates the same cipher
40
Q

How does the CTR mode work?

A

an arbitrary block is encrypted and XORed with the plaintext to produce the cipher text. identical blocks can produce different values

41
Q

What are the features of the AES in counter mode?

A
  • allows for a block cipher to be treated as a stream cipher
  • ## can be encrypted in parallel
42
Q

What security service does CCMP provide?

A
  • integrity through CBCMAC
  • confidentiality \ (CTR)
    -authentication through keys
  • access control
43
Q

What are the inputs used by the CCMP integrity and encryption process?

A
  • Temporal keys: PTK (unicast) and GTK(group and multicast)
    Packet Number: like the TKIP sequence #, protects from injection/replay
  • Nonce: a nonce is a value used to ensure the uniqueness of the encryption keys and initialization vectors (IVs)
  • 802.11 data frame
  • AAD used to verify integrity
44
Q

What do organisations that need higher end security typically?

A

Proprietary implementation that require custom sw installation

45
Q

Draw the WEP, WPA and WPA2 table

46
Q

Compare TKIP, WEP and CCMP in a table