Week 3 Flashcards

1
Q

Explain Encryption

A

Encryption is the process of transforming information (plain text) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key: the result of encryption is termed cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain hash function

A

Hash function: generate unique number; easy; non-traceable

  • e.g. Hash(m) = mod(m, n), remainder after dividing by n, for n prime Hash(‘hello’) = mod(8 5 12 12 15, 127) = 100
  • If message changes, so does the hash. E.g. Hash(‘hallo’) = 92
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain Symmetric Key Cryptography

A
  • Symmetric key algorithms*: parties have the same key
  • symmetric key (like DES, 3DES, AES)

In conventional cryptography, key k is used both for encryption (E) of plain text m and for decryption (D) of cipher text c.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain Asymmetric Key Cryptography (public key cryptography)

A

Uses a pair of two related keys (PK,SK)

Public key (PK): published and distributed (Alice, or others) Secret key (SK): private and unique (only Bob)

where the private key SK cannot be derived from the public key PK and the private key SK cannot be found by a ‘chosen plaintext attack’

It does not matter if someone intercepts PKB. It is public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the advantages of PK cryptography?

A
  • Communication partners who do not know each other can send secure messages to each other, provided
  • the secret key is really kept secret by its owner
  • the public key is unambiguously linked to its owner.
  • This can be established by a chain of trust (compare procedures for collecting a passport)
  • Messages can be electronically signed enabling implementation of authentication and non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain confidentiality, authentication and integrity in the context of PK cryptography

A
  • Confidentiality*: Only Bob has SKB to decrypt cipher text C
  • Authentication*:
  • (1) Use secure key distribution to link PKB to Alice. (e.g. chain of trust, using certificate authorities (CA)).
  • (2) Use SKA to encrypt. Anyone with PKA can test.

Integrity:

  • Alice makes a unique ‘hash’ of the message, encrypts that with PKB and sends it securely along.
  • Bob decrypts and recalculates the hash;
  • Bob compares to find differences (SHA-1 algorithm)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain Key management and the problem of it

A

Key management refers to mechanisms to bind a person to a key and mechanisms for generation, maintenance and revocation of keys.

Problems with key management:

  • key distribution: make sure only authorized people have key (e.g. installing WIFI at home) Tip: Establish a secure chain of trust
  • secrecy: how to keep keys secret and do not forget
  • storage: on special device (smart card), store encrypted. (what you have (smart card), what you know (password), what you are (biometrics))
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name the 4 symmetric algorithms

A
  • AES (preferred standard)
  • DES (insecure)
  • 3DES (still widely used)
  • IDEA, Twofish, Serpent: variants designed to replace DES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

name the 4 Asymmetric algorithms

A
  • Diffie-Hellman (theoretical)
  • RSA (preferred standard)
  • Elliptical Curve (sometimes used)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Conclusions of algorithms (=summary)

A

Hash functions: unique code Symmetric key encryption:

  • sender and receiver share the same key
  • security relies on key distribution procedure.

Public key encryption:

  • Sender has a public key; only receiver has private key.
  • Public key is allowed to be intercepted!
  • Use of keys to ensure security concerns*:
  • Confidentiality, integrity, authenticity
  • Key management* and governance are crucial (Diginotar).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly