Week 5 Flashcards
What is a Nonce (short for: number used once)?
A fresh secret only known to the person generating it
What is a Protocol?
A protocol consists of a set of rules (conventions) that determine the exchange of messages between two or more principals
So basically, a distributed algorithm with emphasis on communication
What is a Security Protocol?
Uses cryptographic mechanisms to achieve security objectives, eg. entity or message authentication, key establishment, integrity, timeliness, fair exchange, non-repudiation
What is the definition of a Perfect Cryptography Assumption?
Encrypted messages may only be read by the legitimate recipients who have the keys required to decrypt them
Look up how Needham Shroeder with Conventional Keys (NSCK) (part of lecture i had no clue on what he was on about)
What is the Person-in-the-middle attack?
A <—> i <—> B
agent i poses as person A to person B and person B to person A to get sensitive info
What is the Replay attack?
Attacker resuses parts of previous messages
What is the Masquerading attack?
Pretend to be another principal
What is the Reflection attack?
Send transmitted information back to originator
What is the Oracle attack?
Take advantage of normal protocol responses as encryption and decryption “services”
What is the Binding attack?
Using messages in a different context/ for a differenet purpose than originally intended
What is the Type Flaw attack?
Substitute a different type of message field