Week 5 Flashcards

1
Q

What is a Nonce (short for: number used once)?

A

A fresh secret only known to the person generating it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Protocol?

A

A protocol consists of a set of rules (conventions) that determine the exchange of messages between two or more principals

So basically, a distributed algorithm with emphasis on communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Security Protocol?

A

Uses cryptographic mechanisms to achieve security objectives, eg. entity or message authentication, key establishment, integrity, timeliness, fair exchange, non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the definition of a Perfect Cryptography Assumption?

A

Encrypted messages may only be read by the legitimate recipients who have the keys required to decrypt them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Look up how Needham Shroeder with Conventional Keys (NSCK) (part of lecture i had no clue on what he was on about)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Person-in-the-middle attack?

A

A <—> i <—> B

agent i poses as person A to person B and person B to person A to get sensitive info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Replay attack?

A

Attacker resuses parts of previous messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Masquerading attack?

A

Pretend to be another principal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Reflection attack?

A

Send transmitted information back to originator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Oracle attack?

A

Take advantage of normal protocol responses as encryption and decryption “services”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Binding attack?

A

Using messages in a different context/ for a differenet purpose than originally intended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Type Flaw attack?

A

Substitute a different type of message field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly