Week 1 Flashcards

1
Q

List all the security services?

A
  • passive setting
  • Active attack
  • Confidentiality
  • Data integrity
  • Data Origin Authentication
  • Entity authentication
  • Non-Repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Passive setting?

A

Unauthorized access to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an active attack?

A

unauthorized alteration, deletion, transmission, or access prevention to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is confidentiality?

A

The assurance that the data cannot be viewed by an unauthorized user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is data integrity?

A

Assurance that the data has not been altered in an unauthorized way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is data origin Authentication?

A

Assurance that a given entity was the original source of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is Entity Authentication?

A

The assurance that a given entity is involved and currently active in a communication session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Non-Repudiation?

A

The assurance that an entity cannot deny a previous commitment or action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is stronger, Data Origin Authenticaion or Data integrity?

A

Data Origin authentication requires data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is stronger Non-Repudiation of a Source or Data Origin Authenticaion?

A

Non-Repudiation of a source requires Data Origin authenticaion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Does confidentiality imply data origin authentication?

A

No it doesn’t, and adversary can re-arrange the encrypted message, so that they decrypt to a legit message, which wasn’t sent by the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Cryptographic primitive?

A

A cryptographic service which provides a number of specified security services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a cryptographic algorithm?

A

the specification of a cryptographic primitve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is a cryptographic protocol?

A

the implementation of some cryptographic primitve and their infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the keyspace?

A

the collection of all possible decryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is encryption different to access control?

A

Access control is a mechanism that prevents unauthorized users from accessing data, However, it is related to data location and difficult to implement when data is “communicated”

17
Q

How is encryption different from Steganography?

A

Stegangraphy is about data hiding, the attacker wonte even know there is information there.

You can combine them to provide multiple layers of security.

18
Q

What is Symmetric key cryptosystems?

A
  • the E and D key are essentially the same
19
Q

What is public key cryptosystems?

A
  • computationally impossible to determine the D key from the E key.
20
Q

What is Kerckhoff’s principle?

A

The cryptographic algorithm should be required to be secret.

21
Q

What are the reasons for publicly known algorithms?

A
  • Scrutiny: studied by wide range of experts
  • Interoperability: easier to adopt
  • Transparency: Easier to convince trading partner to use their secuirty techniques.
22
Q

What assumptions do we have in a cryptosystem?

A

The attacker knows:
- All transmitted ciphertext
- some corresponding plaintext-ciphertext paris
- details of the encryption algorithm

23
Q

What is a Ciphertext-only attack?

A

Attacker only knows the encryption algorithm and some ciphertext.

24
Q

What is a known-plaintext attack?

A

attacker knows some plaintext-ciphertexdt pairs

25
Q

What is a chosen plaintext attack?

A

attacks with some plaintext ciphertext pairs where the pairs correspond to plaintext chosen by the attacker.