TLS Protocol Flashcards

1
Q

Static vs ephermeral DH

A

static DH: always use same private DH key
EDH: use new private DH key for every new connection -> forward security
Same for ECDH and ECDHE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RSA authentication

A
  1. client checks validity of certificate (follow cert. chain to root of trust)
  2. Use public key extracted from cert to auth the private-key-signed message
  3. encrypt the premastersecret with the public key –> only the server knowing the private key can decrypt it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FRAGE: Replay attack knowing nonce

A

Cannot decrypt message, but replay to trigger non idempotent operations (like transferring money)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

explain aufbau cipher TLS_DH_WITH_AES_256_CBC_SHA

A

DH: Key exchange
AES_256_CBC: encryption
SHA: MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Problematic ciphers Key exhange

A

DH, DH_anon, ECDH -> no forward secrecy, no auth

RSA-> no forward secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Problematic ciphers encryption

A

Block ciphers are ill advised: CBC: padding oracle attack: POODLE
DES: not secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Problematic MAC algo

A

SHA: not collision resistant
MD5: broken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Role of ClientFinished / ServerFinished

A

ClientFinished= PRF(ms, transcript) used to compare views of the protocol, prevents downgrade attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Role of nonce in client Hello

A

used to prevent replay attack. attacker that can guess the nonce can replay a handshake with the same nonce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Main Goals of TLS Handshake

A
  1. Protects negotiation of all cryptographic parameters (TLS version number, algorithms etc)
  2. Provides Authentication of server (usually) / client (rarely)
  3. Establish keys used in record protocol -> mastersecret and derive all other keys from that
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Draw RSA vs DH based key establishement protocol

A

slides 03-tls 14/15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

authentication in DH

A

server certificate contains DH parameters –> authenticated

no forward secrecy because static

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

draw tls key derivation

A

03-tls 24

splitting up of key_block into components depends on cipher suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

goal of record protocol

A
  1. data origin auth. and integrity (by MAC)
  2. confidentiality (by symmetric encryption)
  3. anti-replay using sequence numbers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly