Week 5 Flashcards

1
Q

What is a Nonce and how it is used?

A

Number that is used only once.

Nonce is decrypted, one is added, encrypted again.

Prevents against replays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Key Establishment Protocol?

A

Principals set up a session key.

To be sure they are communicating with the correct principal, they must either know each others public keys or use a TTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the Needham-Schroeder public key protocol?

A

Assume A and B know eachothers public keys:

A -> B: Eb(Na, A)
B -> A: Ea(Na, Nb)
A -> B: Eb(Nb)

Na and Nb can then be used to generate a symmetric key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an attack against NH protocol, and how do we prevent it happening?

A

Man-in-the-middle.

  1. B -> A : Ea(Na, Nb, B)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Forward Secrecy?

A

When a message is kept secret from an attacker who has:

  • Recording of the protocol run.
  • Long term keys of the principals.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe Station-to-Station Protocol?

A

A -> B: gx
B -> A: gy, {Sb(gy, gx)}gxy
A -> B: {Sa(gy, gx)}gxy
B -> A: {M}gxy

x, y, gxy not stored.
Ensures forward secrecy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Certificate?

A

TTP signs their identity and public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe NS key establishment protocol?

A

A and B use trusted third party S to establish Kab.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some key establishment goals?

A

Key freshness - either from trusted third party or using a new nonce.

Key exclusivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some authentication goals?

A

Far-end operative: A knows that B is currently active.

Once authentication: A knows that B wishes to communicate with A.

These together form Entity Authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When does a protocol provide Mutual Belief?

A

When its key is a good key and it has entity authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly