P2L9: Security Protocols Flashcards
1
Q
What are the building blocks for Security Protocols?
A
- Public key (asymmetric) algorithm
- Secret key (symmetric) algorithm
- Hash Functions
2
Q
What are key things to look out for in Mutual Authentication with Shared Keys?
A
- The “challenge” (R1 & R2) sent for proving authentication shouldn’t repeat (or at least not easily) since an attack can just watch the challenge and save the response to be used later when the challenge is repeated
- This can be done by using large random values for R1 and R2
3
Q
Authentication can be one way. T/F
A
True, since clients need to authenticate to servers, but not other way
4
Q
What is a reflection attack and how can it be mitigated?
A
- A reflection attack is a man in the middle attack while two parties are authenticating, where the impersonator reflects back the answers.
- This can be stopped by either:
- Using two different secret keys, so Bob encrypts with R1 and Alice encrypts with R2
- Using a different type of challenge for the initiator and responder (for example odd for initiator and even for responder)
5
Q
With public keys we can use signing to achieve mutual authentication. T/F
A
True
6
Q
What is a long term secret key called?
A
Master key
7
Q
What is the problem with shared master keys and what is the solution?
A
- They do not scale
* Key Distribution Centers (KDC) are the solution
8
Q
What is KerberOs?
A
- A KDC
- Authentication and Access Control system for networks
- Every principal has a master key
- Humans have keys based on passwords
- Computers have keys based on their device
9
Q
What are the benefits to Kerberos?
A
- Localhost doesn’t need to store passwords
- Master key is used less, only once a day, and then Kerberos gives a session key for every day
- Limits the exposure of the master key