rand Flashcards

save

1
Q

computationally secure

A

An encryption scheme is computationally secure if the ciphertext generated by the scheme meets one or both of the following criteria: • The cost of breaking the cipher exceeds the value of the encrypted information. • The time required to break the cipher exceeds the useful lifetime of the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The RSA Public Key Encryption algorithm is satisfactory if, given e and n, d can be easily determined.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

For Symmetric encryption to work, the keys must be hosted in a public place.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The RC4 algorithm is a symmetric block cipher.

A

False

RC4 is a stream cipher.

It is a variable-key-size stream cipher with byte-oriented operations. The algorithm is based on the use of a random permutation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Timing attacks are a byproduct of how RSA functions and therefore only impact RSA.

A

False.

a snooper can determine a private key by keeping track of how long a
computer takes to decipher messages [KOCH96]. Timing attacks are applicable
not just to RSA, but also to other public-key cryptography systems. This attack is
alarming for two reasons: It comes from a completely unexpected direction and it
is a ciphertext-only attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Four approaches to attacking RSA algorithm

A

Four possible approaches to attacking the RSA algorithm are as follows:
• Brute force: This involves trying all possible private keys.
• Mathematical attacks: There are several approaches, all equivalent in effort to
factoring the product of two primes.

• Timing attacks: These depend on the running time of the decryption algorithm.

• Chosen ciphertext attacks: This type of attack exploits properties of the RSA
algorithm. A discussion of this attack is beyond the scope of this book.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In order for 4 people to communicate securely using public key cryptography, only 4 pairs of keys need to be generated.

A

True

n key pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In cryptanalysis, the ciphertext-only attack is the easiest to defend against.

A

True

The ciphertext-only attack is the easiest to defend against because the opponent
has the least amount of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Elliptic curve cryptography (ECC) is promising because it provides equal security compared with RSA with a larger bit size.

A

False

The principal attraction of ECC compared to RSA is that it appears to offer
equal security for a far smaller bit size, thereby reducing processing overhead. On
the other hand, although the theory of ECC has been around for some time, it is
only recently that products have begun to appear and that there has been sustained
cryptanalytic interest in probing for weaknesses. Thus, the confidence level in ECC
is not yet as high as that in RSA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If both the sender and receiver have the same key, the system is referred to as

A

Symmetric encryption, single-key encryption, secrety key encryption.

NOT public key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Each party wishing to communicate with RSA Encryption must have:

A

A pair of one Private Key and a Public Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Stages in Advanced Encryption Standard (AES)

A

Add round, shift rows, substitute bytes, mix columns

mix rows is not a stage in AES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is considered a public-key cryptography algorithm?

A

Diffie-Hellman.

Not

DES (Data Encryption Standard)

RC4

AES (Advanced Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is/are true about block cipher modes of operation?

A

With the Electronic Code Book mode (ECB), if the same b-bit block of plaintext appears more than once in the message, it always produces the same ciphertext.

A plain text of length nb is divided into n b-bit blocks (P1, P2,c,Pn).
Each block is encrypted using the same algorithm and the same encryption key, to

produce a sequence of n b-bit blocks of ciphertext (C1, C2,c,Cn).

For lengthy messages, the ECB mode may not be secure. A cryptanalyst may
be able to exploit regularities in the plaintext to ease the task of decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Applications for Public-Key Cryptosystems

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If there are 4 individuals, under symmetric key distribution (where individuals share the same keys), how many total keys are needed for all individuals to securely communicate with one another?

A

6 keys

Each time a new user is added to the system, it needs to share anew key with each previous user. Thus, fornusers, we have1 + 2 +. . .+ (n−1) =n(n−1)/2 keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In general, cryptographic systems are classified along which dimensions?

A

I. The type of operations used to transform plaintext to ciphertext

II. The number of keys used

III. The way in which the plaintext is processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In RSA cryptography, which of the following recommendations for p and q help create a value of n that is harder to factor?

A

Both (p - 1) and (q - 1) should contain a large prime factor

19
Q

Symmetric Encryption Ingredients

A

A symmetric encryption scheme has five ingredients (Figure 2.1):
• Plaintext: This is the original message or data that is fed into the algorithm as
input.
• Encryption algorithm: The encryption algorithm performs various substitutions
and transformations on the plaintext.
• Secret key: The secret key is also input to the encryption algorithm. The exact
substitutions and transformations performed by the algorithm depend on the
key.
• Ciphertext: This is the scrambled message produced as output. It depends on
the plaintext and the secret key. For a given message, two different keys will
produce two different ciphertexts.
• Decryption algorithm: This is essentially the encryption algorithm run in
reverse.
It takes the ciphertext and the secret key and produces the original
plaintext.

20
Q

Symmetric Encryption requirements for secure use

A
  1. We need a strong encryption algorithm. At a minimum, we would like the
    algorithm
    to be such that an opponent who knows the algorithm and has
    access
    to one or more ciphertexts would be unable to decipher the ciphertext
    or figure out the key. This requirement is usually stated in a stronger form:
    The opponent should be unable to decrypt ciphertext or discover the key even
    if he or she is in possession of a number of ciphertexts together with the plaintext
    that produced each ciphertext.
  2. Sender and receiver must have obtained copies of the secret key in a secure
    fashion and must keep the key secure. If someone can discover the key and
    knows the algorithm, all communication using this key is readable.
21
Q

Approaches to attacking a symmetric enryption scheme

A

Cryptanalysis

Brute-Force attack

22
Q

Public key algorithms are based on simple operations on bit patterns

A

False.

Public-key algorithms are based on mathematical functions rather than on simple operations
on bit patterns, such as are used in symmetric encryption algorithms.

More impor
tant,
public-
key cryptography is asymmetric, involving the use of two separate keys, in
contrast to symmetric encryption, which uses only one key. The use of two keys has pro
found
consequences in the areas of confidentiality, key distribution,
and authentication.

23
Q

Hash function requirements

A

satisfies first 5 - weak hash

all 6 - strong hash

24
Q

message authentication

A
25
Q

Digital Signature

A

Although it is not important
that the message be kept secret, he wants Alice to be certain that the message
is indeed
from him. For this purpose, Bob uses a secure hash function, such as
SHA-512, to generate
a hash value for the message and then encrypts the hash
code with his private
key, creating a digital signature.

When Alice receives the message plus signature, she (1)
calculates a hash value for the message; (2) decrypts the signature using Bob’s
public key; and (3) compares
the calculated
hash value to the decrypted hash
value.

26
Q

The Digital Signature standard can be used for encryption, key exchange, and digital signing.

A

The DSS uses an algorithm that is designed to provide only the digital signature
function. Unlike RSA, it cannot be used for encryption or key exchange.

27
Q

It is necessary to go to multiple realms as a Kerberos environment grows in order to maintain performance.

A

false.

As client/server applications become more popular, larger and larger client/server
installations are appearing. A case can be made that the larger the scale of the
networking
environment, the more important it is to have logon authentication. But
the question arises: What impact does Kerberos have on performance in a largescale
environment?
Fortunately, the answer is that there is very little performance impact if the
system is properly configured. Keep in mind that tickets are reusable. Therefore,
the amount of traffic needed for the granting ticket requests is modest. With respect
to the transfer of a ticket for logon authentication, the logon exchange must take
place anyway, so again the extra overhead is modest.
A related issue is whether the Kerberos server application requires a dedicated
platform or can share a computer with other applications. It probably is not wise to
run the Kerberos server on the same machine as a resource-intensive application
such as a database server. Moreover, the security of Kerberos is best assured by
placing the Kerberos server on a separate, isolated machine.
Finally, in a large system, is it necessary to go to multiple realms in order to
maintain performance? Probably not.

28
Q

Kerebero Realms

A

A full-service Kerberos environment consisting of a Kerberos server, a number of
clients, and a number of application servers, requires the following:
1. The Kerberos server must have the user ID and password of all participating
users in its database. All users are registered with the Kerberos server.
2. The Kerberos server must share a secret key with each server. All servers are
registered with the Kerberos server.
Such an environment is referred to as a realm.

29
Q

RFC 4949

(deals with digital certificats on asymmetric cryptography)

A

defines public-key infrastructure (PKI) as
the set of hardware, software, people, policies, and procedures needed to create,
manage, store, distribute, and revoke digital certificates based on asymmetric cryptography.
The principal objective for developing a PKI is to enable secure, convenient,
and efficient acquisition of public keys.

30
Q

One critical problem of PKI, as defined in RFC 4949, is the assumption that all of the CAs in the trust store are equally trusted, equally well managed, and apply equivalent policies.

A

True

Other problems:

the reliance on the user to make an informed decision when there is a problem verifying a certificate.

A further concern is that different implementations, in the various web browsers and operating systems, use different “trust stores,” and hence present different security views to users.

31
Q

The primary purpose of the Diffie-Hellman algorithm (key agreement) is to securely exchange a secret key between two users for subsequent encryption of messages (typically with symmetric encryption algorithms).

A

True

The purpose of the algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages. The algorithm itself is limited to the exchange of the keys.

32
Q

For RSA, a large key space is the defense against the brute force approach, which is the same as for other cryptosystems.

A

True

33
Q

The security of Hash-Based Message Authentication Code (HMAC) depends in some way on the cryptographic strength of the underlying hash function.

A

True

The security of a MAC function is generally expressed in terms of the probability of successful forgery with a given amount of time spent by the forger and a given number of message-MAC pairs created with the same key

Probability of successful attack on HMAC is equivalent to one of the following attacks on the embedded hash function:

  1. The attacker is able to compute an output of the compression function even with an IV that is random, secret, and unknown to the attacker.
  2. The attacker finds collisions in the hash function even when the IV is random and secret.
34
Q

By presenting their public key to a Certificate Authority in a secure fashion, a user can obtain a certificate which can be used by other users to verify that user’s public key.

A

True

A user can present
his or her public key to the authority in a secure manner and obtain a certificate. The user can then publish the certificate, or send it to others. Anyone needing this user’s public key can obtain the certificate and verify that it is valid by way of the attached trusted signature, provided they can verify the CA’s public key.

35
Q

A Certificate Authority’s public key is not needed to verify a certificate it has issued.

A

False

36
Q

Requirements to be a part of a Kerberos realm?

A

The Kerberos server must share a secret key with each server

All servers are registered with the Kerberos server

37
Q

X.509 Certificates

A

1.Conventional (long-lived) certificates: are the CA and “end user” certificatesdiscussed above. They are typically issued for validity periodsof months toyears.

• Short-lived certificates: are used to provide authentication for applications such as grid computing, while avoiding some of the overheads and limitations of conventional certificates [HSU98]. They have validity periods of hours to days, which limits the period of misuse if compromised. Because they are usu ally not issued by recognized CA’s, there are issues with verifying them out side their issuing organization.
• Proxy certificates: are now widely used to provide authentication for applications such as grid computing, while addressing some of the limitations of short-lived certificates. They are defined in RFC 3820, and are identified by the presence of the “proxy certificate” extension. They allow an “end user” certificate to sign another certificate, which must be an extension of the existing certificate with a sub-set of their identity, validity period, and authorizations.
They allow a user to easily create a credential to access resources in
some environment, without needing to provide their full certificate and rights. There are other proposals to use proxy certificates as network access capability tickets, which authorize a user to access specific services with specific rights.
• Attribute certificates: use a different certificate format, defined in RFC 5755, to link a user’s identity to a set of attributes that are typically used for authorization and access control. A user may have a number of different attribute certificates, with different sets of attributes for different purposes, associated
with their main conventional certificate. These attributes are defined in an “Attributes” extension. These extensions could also be included in a
conventional certificate, but this is discouraged as being too inflexible. They may also be included in a proxy certificate, further restricting its use, and this is appropriate for some applications.

38
Q

The maximum message size of SHA-1 must be less than:

A

2^64 bits

39
Q

Hash-Based Message Authentication Code (HMAC)

A

HMAC has been chosen as the mandatory-to-implement MAC for IP security

HMAC is used in Transport Layer Security (TLS)

40
Q

HMAC Design Objectives

A

RFC 2104 lists the following design objectives for HMAC:
• To use, without modifications, available hash functions—in particular, hash functions that perform well in software, and for which code is freely and widely available.
• To allow for easy replaceability of the embedded hash function in case faster or more secure hash functions are found or required.
• To preserve the original performance of the hash function without incurring a significant degradation.
• To use and handle keys in a simple way.
• To have a well-understood cryptographic analysis of the strength of the authentication
mechanism based on reasonable assumptions on the embedded
hash function.

41
Q

The security of the Diffie-Hellman key exchange is derived from the fact that

A

Discrete logarithms are difficult to calculate

Exponentials modulo a prime number are easy to calculate

42
Q

Block Cipher modes of operation

A
43
Q

key distribution

A
  1. A key could be selected by A and physically delivered to B.
  2. A third party could select the key and physically deliver it to A and B.
  3. If A and B have previously and recently used a key, one party could transmit the new key to the other, encrypted using the old key.
  4. If A and B each have an encrypted connection to a third party C, C could deliver a key on the encrypted links to A and B.
44
Q

Sha-1

A

SHA-1 has the property that
the change of a single bit of the input produces a new hash value with no apparent
connection
to the preceding hash value