Week4 Flashcards
Which statement is true about authentication?
Authentication is based on each user having a unique set of criteria for gaining access.
Authentication determines whether the user has the permissions to issue specific commands.
Authentication decides if a user has rights to access certain resources.
Authentication tracks resources that a user consumes during access.
Authentication is based on each user having a unique set of criteria for gaining access.
Correct! These criteria can be passwords or CA-issued certificates.
Suppose you have been asked to assess the quality of a security system for a secret building. This building has two locked doors, which together function as multi-factor authentication (MFA) for gaining access. Given what you know about MFA, which method has the weakest security?
Tell a secret password at Door 1 and a different secret password at Door 2.
Tell a secret fact from the last visit at Door 1 and give a number sent to your phone at Door 2.
Scan your fingerprints at Door 1 and sing a secret song you learned on your last visit to the building at Door 2.
Tell a secret password at Door 1 and give a number sent to your phone at Door 2.
Tell a secret password at Door 1 and a different secret password at Door 2.
Correct! MFA requires that the sources for both authentication be different. Because you are asked at both doors to give authentication that has the same source (i.e., something you know), this is not a very secure system. If you encounter this kind of system at the secret building, you should encourage the administrators to change it in your report.
Assuming that Alice is a client and Bob is the server, which statement is true for Alice and Bob in the context of authentication?
Client authentication is when Alice sends Bob a challenge to verify against her valid response.
Two-way authentication is when both Alice and Bob fulfill their challenge-response criteria.
Server authentication is when Bob sends Alice a challenge to verify against her valid response.
One-way authentication is when Alice sends Bob her credentials first, and then Bob does the same.
Two-way authentication is when both Alice and Bob fulfill their challenge-response criteria.
Correct! Users check a website’s SSL certificate to verify that the website is what it says it is, and the website asks for the users’ passwords to verify that the users are who they say they are.
Which component is unusable in a challenge-response system?
Public symmetric keys
Crypto-secure random numbers (CSRNs)
Asymmetric keys
Math puzzles that must be solved in a specific way
Public symmetric keys
Correct! Because the same key is used for encryption and decryption and it is made public, there is no secrecy left.
Given that the One Time Password method involves a user who communicates with the host by using the hashed values of the seed generated by the user, which attack will work on this method?
Replay attack by repeating the number that the user sent to the host.
Stealing the number stored at the host’s end.
Steal the seed with which the user to generate the sequence.
Delete a couple of numbers from the user’s file in which the user stored the chain.
Steal the seed with which the user to generate the sequence.
Correct! With this approach, an attacker will be able to imitate a user just by keeping a count of the conversations between the user and host.
Which kind of OTP is unsuitable for multi-factor authentication?
Authy OTP
Text OTP
Duo OTP
Google Authenticator OTP
Text OTP
Correct! Text-based OTP just sends a secure random number to the user and expects the user to have access to their phone. There is no application of a FOB in this implementation.
Consider a case of a public key challenge-response scheme to send a message m, where the server knows the user’s public key and the response to the challenge from the user is made using the private key. Given this information, which equation holds true?
E_{k1}E k1(E_{k2}E k2(m)) = m
E_{k1}E k1 (E_{k1}E k1(m)) = m
E_{k2}E k2(E_{k2}E k2(m)) = m
E_{k2}E k2(m) = E_{k1}E k1(m)
E_{k1}E k1(E_{k2}E k2(m)) = m
Correct! One can get the message back from the cipher that was generated using one key of PKI by encrypting the cipher with the other key.
Question 4
Which response to a challenge is vulnerable to attacks?
E_{K2}(R)
R2, EK2(R1 ,R2)
E K2(H(R))
E R(msg)
E_{K2}(R)
Correct! An attacker could use this plaintext cipher for cryptoanalysis, or they could just build a database of random numbers encrypted with the user’s private key and use that cipher to imitate the user anytime they found a matching random number being sent from the host.
Suppose that Alice and Bob want to communicate. Consider this scenario:
Alice generates a hash sequence: 4654 → 8945 → 1341 → 2038 → 7439 → 4875.
Alice gives Bob the hash value 7439 of the sequence in person when they meet.
Which value does Alice need to send in order for Bob to authenticate her as a secure party? 2038 4875 8945 4654
2038
Correct! Bob will update the secret hash he knows every time with the number Alice sends him from the sequence.
Which statement best describes the key exchange problem?
It was difficult to share PKI asymmetric keys on open channels.
It was difficult to share symmetric keys on open channels.
It was difficult to be unable to communicate after having shared the secret key securely so that only the right people knew about it.
It was difficult to build secret channels using open channels.
It was difficult to share symmetric keys on open channels.
Correct! Any channel is, by default, considered compromised, so using them to share secrets was difficult.
Which game falls outside of the Merkel’s puzzle category? Tic-tac-toe Rubik’s cube Crossword puzzles Sudoku
Tic-tac-toe
Correct! Tic-tac-toe is simple and fun to solve, and verifying it is very simple. Thus, it cannot be categorized as one of Merkel’s puzzles because of the format of the puzzle or game.
Question 3
In order to establish a secure channel using Merkel puzzles, step does a person need to precompute?
A million different puzzles
Encryption of the index with the solution for every puzzle at the respective index.
Index for a million puzzles
Solutions to a million puzzles
Encryption of the index with the solution for every puzzle at the respective index.
Correct! One must choose an encryption algorithm that should be used, and this person would need to keep the ciphers for indices ready to figure out which solution is the key.
Assume that Alice has come up with 21 puzzles instead of a million, and each puzzle takes about 5 minutes to solve. Also assume that Bob randomly chooses any one of these puzzles. What is the least amount of secure time that Alice and Bob have to talk to each other if Eve starts solving puzzles from Top and Bottom simultaneously?
5 minutes
50 minutes
100 minutes
105 minutes
5 minutes
Correct! Bob might have chosen the first or the last puzzle, so the guaranteed minimum amount of secure time Alice and Bob have is only 5 minutes.
Question 1
Which definition best describes co-prime numbers?
Two numbers are said to be co-prime if both numbers are only divisible by themselves and 1.
Two numbers are said to be co-prime if the only positive integer that divides both of them is 1.
Two numbers are said to be co-prime if they share the largest number that divides both of them.
Two numbers are said to be co-prime if one number divides another and no remainder is left.
Two numbers are said to be co-prime if the only positive integer that divides both of them is 1.
Correct! For example, 14 and 15 are co-prime numbers because they are commonly divisible by 1 only. Conversely, 14 and 21 are not coprime because they are both divisible by 7.
In Diffie Hellman, if Alice and Bob forget to raise the generator to any power, what will be the value they end up sharing?
x,y
1
N
g
g
Correct! Since g < N, the modulus will always result in g.