Security Protocols Flashcards

1
Q

It is a good idea to use sequentially increasing numbers as challenges in security protocols.(T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In security protocol, an obvious security risk is that of impersonation.(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In Kerberos, the authentication server shares a unique secret key with each authorized computer on the network.(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In Kerberos, each human user has a master key shared with the authentication server, and the key is usually derived from the user’s password.(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In Kerberos, the purpose of using ticket-granting-ticket (TGT) is to minimize the exposure of a user?s master key.(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ticket-granting ticket is never expired.(T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Kerberos does not support inter-realm authentication. (T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The purposes of a security protocol include:

A

A. Authentication

B. Key-exchange

C. Negotiate crypto algorithms and parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Example scenarios requiring a security protocol:

A

log in to mail.google.com

connecting to work from home using a VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

network protocol defined

A

A network protocol defines the rules and conventions for communications between two entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

security protocol defined

A

A security protocol defines the rules and conventions for SECURE communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Kerberos Protocol

A

Authentication and access control in a network environment

Every principal has a master (secret) key

  • -Human user’s master key is derived from password
  • -Other resources must have their keys configured in

All principals’ master keys are stored in the KDC database, protected/encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Kerberos Benefits

A

Localhost does not need to store passwords

The master key that the user shares with the KDC is only used once every day
–This limits exposure of the master key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ticket granting ticket

A

AS responds with TGT and session key, both encrypted with one time encryption key (DES)

TGT is a set of credentials used by client to apply for service

  • -not just a specific application service
  • -it’s for a ticket granting server that can be used to get more tickets

Indicates the AS has accepted the client and its user

Contains:

    • user’s ID
  • -server’s ID
  • -timestamp
    • lifetime after which ticket is invalid
  • -copy of session key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Kerberos environment requirements

A

Kerberos server must have user ID and password of all participating users in its database.

Kerberos server must share a secret key with each server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Certificates

A

Certificates issued from trusted third party that links public key with identity of key’s owner

Certificate Authority trusted by user community
–user present public key and obtains certificate

Certificate variants:

  • -Conventional (long-lived) certificates
  • -Short-lived certificates
  • -Proxy certificates (allow end user certificate to sign another certificate to extend it)
  • -Attribute Certificates: links user’s identity to set of attributes used for authorization and access control
17
Q

Public Key Infrastructure

A

set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates based on asymmetric cryptography

Principle Objective

18
Q

Public Key Infrastructure Principle Objective

A

Enable secure, convenient, efficient acquisition of public keys

19
Q

Public Key Infrastructure issues

A

Reliance on the user to make an informed decision when there is a problem verifying certificate problem because users just accept

Assumption that all of the CAs in the trust tore are equally trusted, equally well managed, and apply equivalent policies

Different implementations in various web browsers and operating systems use different trust stores, so present different security views