Part 4, Going dark Flashcards
how would law enforcement use the Law Enforcement Access Field (LEAF) if they were investigating alice or bob
- Intercept the LEAF and the encrypted message
- Arrange with a judge that their unit key be released by the US treasury and the national institute of standards and technology (NIST)
- Decrypt the first layer of encryption using the family key
- Decrypt the second layer of the LEAF using the unit key revealing bob and alices symmetric key
- Decrypt the message using the symmetric key
the
unit key of the clipper chip
was held in key escrow but how exactly was it held
this was split in half and split between:
- The US treasury
- The National Institute of Standards and Technology (NIST)
the keys this held were:
- An 80 bit unit key - a unique key for each device
- A family key - a generic key, held by government
what two keys were held by the
clipper chip
this is a claim or statement that you would like your audience to believe
what is the
main claim
within an argument
what is a
TOR node
this is a computer that is currently connected to the TOR network and is able to relay messages and be part of a TOR circuit
this used the
skipjack symmetric algorithm
what encryption algorith did the
clipper chip
use
why did the
clipper chip fail
- Weaknesses were found with the hash authentication of the LEAF being that collisions were present
- Later it was found that skipjack itself was not strong as it was cracked just days after the documents for it were published
Since collisions existed within clipper it was possible to find a collision for the symmetric key with a fake symmetric key
this was created because the U.S government needed a way to keep the communications from intelligence agents anonymous while overseas
why was
TOR
created
what is the
Law Enforcement Access Field (LEAF)
generated by the clipper chip and what does it allow
this is a session key that has been:
- encrypted by said users unit key
- a hash of the encrypted session key generated
- the hash and encrypted session key combined and encrypted using the family key
this allows authoritys to decrypt communications of anyone they are investigating
what are four
problems with banning the importation of encryption software
- Many everyday applications such as payment apps require encryption in order to work
- Encryption software can be easily smuggled in to a country
- The source code of encryption software is widely available on the internet
- The underlying mathematics of encryption is widely available and if one so wished could be used to mimic a specific type of encryption
this is a computer that is currently connected to the TOR network and is able to relay messages and be part of a TOR circuit
what is a
TOR node
this was split in half and split between:
- The US treasury
- The National Institute of Standards and Technology (NIST)
the
unit key of the clipper chip
was held in key escrow but how exactly was it held
- Intercept the LEAF and the encrypted message
- Arrange with a judge that their unit key be released by the US treasury and the national institute of standards and technology (NIST)
- Decrypt the first layer of encryption using the family key
- Decrypt the second layer of the LEAF using the unit key revealing bob and alices symmetric key
- Decrypt the message using the symmetric key
how would law enforcement use the Law Enforcement Access Field (LEAF) if they were investigating alice or bob
this was created by the
united states naval research laboratory
where was
TOR created
this is a servers public key that has been hashed and then appended with .onion
how is a
.onion address created
these make up most of the internet and are areas of the internet that either cannot be indexed or have had indexing restricted. These pages will probably exist only for authorised users such as existing behind a login screen
what is the
deep web
you should keep the argument balanced that means creating a supporting claim that supports and opposes your main claim
when constructing an argument what is one important aspect that should be followed
- Alice wishes to have secure and anonymous communication with bob so alice starts by building a circuit
- Alice contacts the directory node which holds a list of every node currently connected to the tor network
- Alice then selects at random a list of nodes from the directory node
- The nodes are then used to create a circuit
what are the four steps of building a
TOR circuit
once alice has created an onion what are the three steps involved in sending it to bob
- alice sends the onion to the guard node in her tor circuit
- alices guard node decrypts the first layer of encryption to reavel a ciphertext and the next address to send the onion
- this process repeats until the exit node is reached which will decrypt the last layer of encryption to reveal alices message
what two keys were held by the
clipper chip
the keys this held were:
- An 80 bit unit key - a unique key for each device
- A family key - a generic key, held by government
- Single use addresses - addresses that are linked to one transaction only
- Multisignature bitcoins - these require the permission from multiple users to be spent
- Bitcoin tumblers - This mixes groups of bitcoin transactions and redistributes coins amongst users in theory making it impossible to link a single transaction
what are three
strategies that bitcoin has implemented to further protect the identity of those using bitcoin
name three reasons that
key escrow failed
some reasons that this failed are:
- Can it be guaranteed that employees cannot steal keys
- Can it be guaranteed that there will be no misuse by government
- Can it be guaranteed that theft by hacking will not occur
these are sites that cannot be visited by standard web browsers and rely on the tor network to exist. In essence a darknet is any site/page that is hidden from unauthorised users or requires specialist software to access
what is the
dark web / dark net
this is a session key that has been:
- encrypted by said users unit key
- a hash of the encrypted session key generated
- the hash and encrypted session key combined and encrypted using the family key
this allows authoritys to decrypt communications of anyone they are investigating
what is the
Law Enforcement Access Field (LEAF)
generated by the clipper chip and what does it allow
what is the
surface web
this only accounts for a fraction of the material that exists on the web and can be indexed by search engines and accessed by anyone
why could TOR not be kept a secret and be used solely by the united states
keeping this a secret would mean that any communication on it would be linked back to america. instead it was made public
to alice what is an
exit node
the node furthest from alice and the last node of alices tor circuit and where data leaves the tor network
the node closest to alice and the first node of alices tor circuit where data enters the tor network
to alice what is the
guard node
what is another form of
controlling the use of encryption software
that has historically proposed
Another form of control that has been proposed is to allow citizens to use encryption but limit the key length meaning that there are less key values and it is possible to brute force the encryption
The suggestion is that the key length should be long enough that everyday hackers cannot brute force the key but short enough so that governments can
this stands for
The Onion Router
what does
TOR
stand for
how is a
.onion address created
this is a servers public key that has been hashed and then appended with .onion
what are the four steps of building a
TOR circuit
- Alice wishes to have secure and anonymous communication with bob so alice starts by building a circuit
- Alice contacts the directory node which holds a list of every node currently connected to the tor network
- Alice then selects at random a list of nodes from the directory node
- The nodes are then used to create a circuit