4- Hash, MAC, Dsign, freshness, passwords Flashcards

1
Q

Data integrity problems

A

1- accidental errors
-> parity checks, CRC
2- active attack:
prevent attacker from creating fake integrity digest
-> include DOA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hash function

A

accepts variable size message and creates fixed-size message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hash function uses (5)

A

1- one-way function
2- component of crypto primitive
3- bind documents
4- source of pseudorandomness
5- bitcoin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hash functions requirements

A

1- preimage resistance
h(x)=z - it’s impossible to find input x
2- 2nd preimage resistance
impossible to find h(x1)=z so that h(x1)=h(x)=z
3- collision resistance
impossible to find x1 such that h(x1)=h(x2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Applications of hash resistances

A

1- preimage:
pw check and storage
2- 2nd preimage:
software downloading
3- collision:
contractual commitment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hash security

A

birthday paradox 2^(L/2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MAC - message authentication codes

A

cryptographic checksum sent along with a message to provide assurance of DOA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MAC process

A

MAC(m) = f (k, m)
k(ab)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MAC security (2)

A

assures:
- data was not altered
- is from the alleged sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MAC algortihms

A

1) CBC-MAC (use last block of CBC), no IV
2) HMAC - hash based MAC
hash+key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HMAC process

A

0- have K1 and K2
1- h (K2 | m)
2- h (K1 | h (K2 | m))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HMAC security

A
  • key security
  • h-function security
  • length of MAC output
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MAC + confidentiality

A

1- MAC -> encrypt
2- encrypt -> MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Digital signature services

A
  • DOA
  • NR
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dsign computed with…

A

data and signer’s parameter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dsign requirements

A
  • easy to sign
  • easy to verify
  • hard to forge
17
Q

RSA-based Dsigns process

A

1- h (doc)
2- apply key and sign. algo to the h
3- send doc and sign
4- receiver:
- computes h (doc)
- runs sign through verification algo with a verification key
5- compares results of both (same+>ok)

18
Q

Reasons for hashing before signing

A
  • efficiency
  • prevention of modification attacks
  • prevention of existential forgeries
19
Q

RSA Dsign process with formulas

A

1- h=h(P)
2- s=h^d mod n
3- A sends (P,s) to B
4- B computes h(P)
- B computes s^e mod n
- B compares h(P) to s^e mod n

20
Q

Additional steps after Dsign

A
  • A encrypts data P and signarture s with B’s public key
  • A adds A identity to encryption
  • A adds B identity to signature
    // => avoid impersonator’s attacks
21
Q

Entity Authentication

A

assurance that entity is involved and currently active in session

22
Q

EA dangers and mechanisms

A
  • danger: impersonator’s attack
  • mech: freshness
23
Q

Freshness mechanisms

A
  • clock-based (synchronisation)
  • sequence numbers (storage)
  • nonces (rng)
24
Q

Pw problems

A
  • length
  • complexity
  • repeatability
  • vulnerabillity
25
Q

Dynamic password schemes

A

combine pw and freshness

26
Q

Dynamic password schemes mechanisms

A

1- synchronisation
2- challenge
3- counter