4472 - Security Final Flashcards
What is Kerkhoffs Principle?
security should be based off secrecy of the key, not the encryption scheme; assume that the encryption scheme is publicly known
What is the ‘don’t roll your own’ principle?
crypto algorithms are very easy to get wrong, don’t make any yourself
What is a brute force attack?
trying every key and/or message until one “works”
A system that can be broken into 2^128 operations has how many bits of security?
128
What are bits of security?
exponential value describing how many operations are necessary to recover a message or key for a cryptosystem
What defines a negligible quantity?
value that is less than on over any polynomial function with degree less than or equal to the security parameter
What is a security parameter?
a variable that measures the input size of the computational problem
What is the security parameter (k) in an RSA cryptosystem?
it is the length in bits of the modulus n, where n is a number in the set 0….(2^k) - 1
What criteria must be met for indistinguishability?
probability that you can tell the difference between two things is less than the negligible quantity
What are pseudo random functions?
random mapping of inputs to outputs, many to one mapping may exists, not necessarily inversible
What are pseudo random permutations?
random mapping of inputs to outputs, one to one mapping, image and pre-image sets are equivalent, unique inverse for every element
What is an “oracle”?
like a black box, ask a question get an answer
What is the hierarchy of security levels?
IND-CCA2 –> IND-CCA1 –> IND-CPA –> IND-EAV
How is IND-CCA2 achieved?
message authentication codes; you need to be able to only create a valid ciphertext with knowledge of a secret key
How is IND-CPA achieved?
by using randomized encryption; encrypting the same message twice should give two completely different results
How is IND-EAV achieved?
you should have negligible advantage telling the difference between cipher text
What are block ciphers used for?
for efficient bulk encryption of data
What is the ideal functionality for block ciphers?
pseudo-random permutation, secret key determines permutation, fixed length input maps to fixed length outputs
What security level is the ECB cipher?
Not even EAV-Secure
What does CBC mode require?
an initialization vector (IV)
What does CTR mode require?
an initialization vector (IV)
What is the benefit of CTR mode over CBC mode?
random access, no decryption function needed
What must an IV be to avoid encryption oracle attacks?
unpredictable to adversary (secret)
What is the block size for AES?
128