Security (4) Flashcards

1
Q

What are the items required to build a complete security protocol?

A
  • Handshake: Alice, Bob use their certificates and private keys to authenticate each other, share secret
  • Key derivation: Alice, Bob use shared secret to derive keys
  • Data Transfer: Series of messages (“records”)
  • Connection Termination: securely close connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the steps in a security protocol handshake?

A

1) Bob establishes TCP connection with Alice
2) Bob verifies Alice’s identity (certificate)
3) Bob sends Alice master secret key MS (used to generate all other keys for session)
Potential Issue: 3 RTTs before client can start receiving data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the steps in the key derivation process in a security protocol?

A
  • Alice and Bob generate the same four keys (Kb, Mb, KA, MA
    Note: keys are derived from predetermined key derivation function (KDF)
  • Process could be as simple as splitting MS into 4 parts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What layer of the protocol stack does TLS sit in?

A

Technically the Application layer, but could be considered in-between Application and Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What protocol does TLS replace?

A

Secure Socket Layer (SSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What types of applications is TLS built to support?

A

Any type of application (e.g. HTTPS is HTTP with messages sent over TLS / SSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does TLS enforce confidentiality?

A

Through symmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does TLS enforce integrity?

A

Through MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does TLS enforce authentication?

A

Through public key cryptography and certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TLS supports several algorithms for different security functions. Which are these functions?

A
  • Key generation
  • Encryption
  • MAC
  • Digital Signature
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does TLS choose a cipher suite?

A
  • The choice of algorithms is negotiated during the handshake
  • Client sends list of supported cipher suites
  • Server chooses one of the supported cipher suites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe QUIC

A
  • Transport layer protocol running on top of UDP
  • Provides reliability of TCP plus security of TLS (can combine connection establishment and security handshake)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly