5 - protocols, key man't, digital sertificates Flashcards

1
Q

Cryptographic protocol

A

specification of message exchanges and action that involve use of cryptographic primitives in order to achieve a set of specific security goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Elements of crypto protocol

A

1- assumptions
2- flow
3- messages
4- actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication and key establishment (AKE) objectives

A

1- mutual entity authentication
2- establishment of a common symmetric key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AKE protocol goals

A
  • mutual:
    – EA
    – DOA
    – key establishment
    – key confirmation
  • key:
    – confidentiality
    – freshness
    – unbiased control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Diffie Hellman protocol properties

A
  • for environemnts w/o secure channels
  • based on discrete logarithm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DH process

A
  • A, B select p (large prime) and q<p (integer)
  • A, B choose secret random n, m
  • A->B: N = q^n mod p
    B->A: M= q^m mod p
  • A: A = M^n = q^mn mod p
    B: B = N^m = q^nm mod p
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DH weakness

A

man in the middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DH in practice

A

public key sertificate:
- public key
- info on owner’s indetity
- Dsign of issuer (verifies certificates)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Key man’t - areas

A
  • lifecycle
  • generation
  • establishment
  • storage
  • usage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Key hierarchy

A
  • master keys (?)
  • keys encrypting keys
  • data keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reason for key distribution

A

n users => n(n-1)/2 pairs (shared master keys)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is used to prove identity in key distribution scenarios?

A

public key certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Public key certificate

A

strong association b/w a public key, its owner and other relevant data (expiry dates, restriction, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PK certificate contents

A
  • owner’s name
  • PK value
  • validity period
  • signature: issuer signs data that forms PKS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Certification authority

A
  • certificate creation and revocation
  • trust anchor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CA chain

A
  • chain of certificates
  • last certificate is trust anchor
17
Q

Getting a PKS

A
  • registration authority
  • certification authority