P2L9 Protocols Flashcards

1
Q

Shared secret key measures to implement

A

The challeng number R should be large and random.

Shared secret key needs to be protected and Alice and Bob (end points of communication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

reflection attack mechanics

A

In the scenario of a simplified handshake process, Attacker Trudy will impersonate Alice and initiate two connections to Bob.

Connection 1 will result in Trudy getting stuck at step three because Trudy cannot encrypt the challenge R1 (from Bob) at step two. Connection 2 will send challenge Bob with R1. Bob responds with encrypted value of R1. Trudy sees this and goes back to connection 1 to complete the malicious step 3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fix to reflection attack

A

Different keys for the initiator and responder

Another method is to use different types of challenges for the initiator and the responder (i.e. even number for Alice and odd number for bob)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

mutual authentication via public keys

A

Alice sends bob challenge R1 that is encrypted using Bob’s public key. Bob decrypts this using his private key. He sends challenge R1 back to Alice (so she can see Bob was able to decrypt) along with his own challenge encrypted with Alice’s public key. Alice decrypts this challenge and sends it back to Bob so bob knows it’s really Alice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

benefit of session key

A

if key is leaked, impact is limited to current session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ways to create session key

A

Via shared master key, via public keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

problem with shared master key

A

does not scale well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

solution to scalability issue of master keys

A

KDC: key distribution center. The KDC act as intermediary between Alice and Bob so that KDC handles the shared keys. Each user only needs a shared master key with the KDC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True of False: authentication should be accomplished before key exchange

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: signing message exchanges in Diffie-Hellman eliminates man in the middle attacks

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

kerberos benefits

A

localhost does not need to store passwords,

master key that user shares with KDC is only used once a day (limits exposure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly