Security Protocols Flashcards
The challenge values used an an authentication protocol can be repeatedly used in multiple sessions
falseP2 L9
The authentication messages can be captured and replayed by an adversary
trueP2 L9
Authentication can be one-way, e.g. only authenticating Alice to Bob
trueP2 L9
A reflection attack is a form of man-in-the-middle-attack
trueP2 L9
To defeat a reflection attack, we can use an odd number as a challenge from the initiator and an even number from the responder
trueP2 L9
We can use signing with public keys to achieve mutual authentication
trueP2 L9
A session key should be a secret and unique to the session
trueP2 L9
Authentication should be accomplished before the session key exchange
trueP2 L9
A key benefit of using KDC (Key distribution center) is scalability
trueP2 L9
In order to for Bob to verify Alice’s public key, the certificate authority must be online
false (just need the CA’s public key, which may be cached)P2 L9
Signing the message exchanges in Diffie-Helman eliminates the man-in-the-middle attack during session key exchange.
trueP2 L9
Kerberos provides authentication and access control
trueP2 L9
Kerberos distributes session keys
trueP2 L9
To avoid over-exposure of a user’s master key, Kerberos uses a per-day key and a ticket-granting-ticket
trueP2 L9
The authenticators used in requests to KDC and application server can be omitted in Kerberos
falseP2 L9