Security (3) Flashcards

1
Q

What is Asymmetric Cryptography?

A
  • Some algorithms use a pair of keys
  • If one key is used for encryption, the other is used for decryption
  • You can generate a pair of keys, but one key cannot be obtained from the other in reasonable computation time
  • One key is kept private, one key is made public (K- and K+
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What kind of arithmetic does RSA encryption rely on?

A

Modular Arithmetic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is RSA Secure?

A
  • If you know the public key (n, e) and want to determine d, you would have to compute factors of n which is a hard problem
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of creating a signature by computing a message digest instead of encryption with a private / public key?

A

Computation of a signature by applying a private key to a long message is computationally expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is a fixed-length “fingerprint” computed?

A

Hash function H is applied to message m, giving a fixes size message digest H(m)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a signed message digest work?

A
  • Instead of signing entire message, sign only hash result
  • Bob sends message and signed digest
  • Alice received message and computes message digest
  • Alice received signed message digest and computed message digest
  • If signed digest and calculated digest are equal, message is considered signed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What properties does a secure hash function have?

A
  • Given x, it is computationally infeasible to find m such that H(m) = x
  • Given m, it is computationally infeasible to find m’ != m such that H(m) = H(m’)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Provide some examples of Hash Function Algorithms

A
  • MD5 (compute 128-bit message digest in 4-step process)
  • SHA1 (160 bit digest), SHA-256, SHA-512
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the main benefit of using a Message Authentication Code (MAC)?

A
  • It is faster, since no encryption is necessary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Message Authentication Code (MAC)?

A
  • Alternative to signed message digest
  • Shared secret s used between parties
  • Hash is computed on m + s
  • Bob sends message m and h = H(m+s)
  • Alice receives (m, h) and computes H(m+s)
  • If h=H(m+s) message is considered signed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Provide three examples of authentication encryption

A
  • MAC-then-Encrypt (IPSec)
  • Encrypt-then-MAC (SSL)
  • Encrypt-and-MAC (SSH)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Certification Authority (CA)?

A
  • Entity registers public key with CA and provides some proof of identity
  • Certification Authority provides a certificate:
    • Binds public key to particular entity
    • Signed by CA’s private key
  • CA’s public key is know (trusted) to public
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe how a certificate is checked

A

When Alice wants Bob’s public key:
- Bob provides a certificate
- Certificate is signed by CA
- Alice applies CA’s public key to confirm certificate’s authenticity
- Certificate contains Bob’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly