Chapter 7 - PKI Flashcards

1
Q

RSA Equation

A

• Depends on difficulty of factoring the product of prime numbers.
1. Choose 2 large prime numbers (200+ digits), labeled p and q.
2. Computer product of numbers: n=p*q
3. Select a number, e, that satisfies two requirements:
a. E is less than n
b. E and (n-1)(q-1) are relatively prime
c. Find a number,d, such that (ed-1) mod (p-1)(q-1) = 0
Distribute e and n as the public key to all cryptosystem users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Merkle-Hellman Knapsack

A
  • Like RSA, based on difficulty of performing factoring operations, but relies on component of set theory known as super-increasing sets rather than on large prime numbers.
    • Broken in 1984.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

El Gamal

A
  • Math principles behind Diffie-Hellman could be extended to support an entire public key cryptosystem used for encrypting and decrypting messages.
    • Depends on modular arithmetic.
    • Advantage over RSA - released to public domain
    • Disadvantage - doubles the length of any message it encrypts - difficult over narrow bandwidth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Elliptic Curve

A
  • Any elliptic curve can be defined by: y2 = x3 + ax + b
    • Harder to solve than RSA.
    • Depends on elliptic curve algorithm problem and provides more security algorithms when both are used with keys of same length.
    • 1024-bit RSA key is same strength as ECC 160-bit key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5 Hash Requirements

A

Five requirements:

1. Input can be any length
2. Output has fixed length
3. Hash function relatively easy to compute for any input
4. Hash function is one way
5. Hash function is collision free
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SHA-1

A
  • Takes input and produces 160-bit message digest.

* Processes a message in 512-bit blocks. Pads message if it doesn’t fit in increments of 512.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SHA-2

A
  • SHA-256 produces 256 bit message digest using a 512-bit block size.
  • SHA-224 uses truncated version of the SHA-256 has to produce a 224-bit message digest using a 512-bit block size.
  • SHA-512 produces a 512-bit message digest using a 1024 bit block size.
  • SHA-384 uses a truncated version of SHA-512 hash to produce a 384-bit digest using a 1024-bit block size.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MD2

A

• Developed in 1989 to provide a secure hash function for 8-bit processors.
• Pads length for multiple of 16 bytes.
• Computes 16-byte checksum and appends to end of message.
• 128-bit message digest is then generated using entire original message along with the appended checksum.
• If checksum is not appended to message before digest computation, collisions may occur.
Proved not a one way function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MD4

A

• Enhanced to support 32-bit processors.
• Padded to ensure that the message length is 64 bits smaller than a multiple of 512 bits.
• Processes 512-bit blocks in three rounds of computation
Final output is 128-bit digest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MD5

A

Processes 512 bit blocks of the message, but uses 4 rounds of computation to produce digest of 128 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HMAC

A

• Hashed Message Authentication Code - implements partial digital signature.
• Guarantees integrity but not nonrepudiation.
Can be used with any message digest algorithm, by using shared key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DSS Digital Signature Standard

A

• 3 approved standard encryption algorithms
○ Digital Signature Algorithm (DSA) as specified in FIPS 186-4
○ RSA as specified in ANSI X9.31
Elliptic Curve DSA (ECDSA) as specified in ANSI X9.62

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

X.509 Certs Contain

A

○ Version of X.509 to which certificate conforms
○ Serial number (from certificate creator)
○ Signature algorithm identifier (specifies the technique used by the certificate authority to digitally sign the contents of the certificate)
○ Issuer name (CA that issued cert)
○ Validity period (starting and ending dates and times)
○ Subject’s name (DN, distinguished name of entity that owns public key)
Subject’s public key (meat of cert - actual public key used to set up secure communications)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Email Encryption - PGP

A

• Phil Zimmerman - 1991.
• Web of trust concept - must be trusted by a user to use the system.
• Initially couldn’t be exported outside the country.
• Two versions:
○ Commericial uses RSA for key exchange, IDEA for encryption, MD5 for message digest production.
○ Freeware uses Diffie Hellman key exchange, Carlisle Adams/Stafford Tavares (CAST) 128-bit encryption, and SHA-1 hasing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Email Encryption - SMIME

A
  • Standard for email encryption
    • Uses RSA
    • Incorporated in outlook, thunderbird, mac os x mail
    • Relies on x.509 certs for exchanging cryptographic keys
    • Supports AES, 3DES
    • Technical limitations - doesn’t work with web based email (must have browser extension)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Circuit Encryption

A
  1. Link Encryption - protects entire circuit by creating secure tunnel between two points using hardware or software. (usually lower level OSI)
  2. End-to-End Encryption - protects comms between 2 parties (i.e. server and client). Protects against intruder on the secure side of encrypted link or traffic sent over unencrypted link. (higher level OSI - SSH)
17
Q

IPsec

A

• Set forth by Internet Engineering Task Force (IETF)
• Does not dictate implementation of all details, open/modular framework.
• Uses public key cryptography
• Primary use for VPN, can operate in transport or tunnel mode.
• Commonly paired with Layer 2 Tunneling Protocol (L2TP) as L@TP/IPsec
• Relies of security associations:
○ Authentication Header (AH) - assures message integrity and non-repudiation. Provides authentication and access control. Prevents replay attacks.
○ Encapsulating Security Payload (ESP) - provides confidentiality and integrity of packet contents. Provides encryption and limited authentication. Prevents replay attacks.
• Two modes:
○ Transport - only packet payload is encrypted (best for peer to peer)
○ Tunnel - entire packet encrypted (best for gateway to gateway)
• Set up session by creating security associations (SA).

18
Q

ISAKMP

A

• Internet Security Association and Key Management Protocol
• Provides background security support services for IPsec by negotiating, establishing, modifying, and deleting security associations.
• Four requirements from RFC 2408:
○ Authenticate communicating peers
○ Create and manage security associations
○ Provide key generation mechanisms
○ Protect against threats (replay and DoS)

19
Q

WEP

A

○ Provides 64 and 128-bit encryption options
○ Optional in IEEE 802.11
○ Broken in 2007 - TJX breach

20
Q

WPA

A

○ Implements Temporal Key Integrity Protocol (TKIP)

21
Q

WPA2

A

adds AES cryptography (appropriate for use)

Only encrypts from machine to WAP.

22
Q

Analytic Attack

A

algebraic manipulation to reduce complexity of algorithm. Focuses on logic of algorithm.

23
Q

Implementation Attack

A

exploits weaknesses in implementation of crypto system. Focuses on exploiting software code, not just errors and flaws but methodology employed to program system.

24
Q

Statistical Attack

A

exploits statistical weaknesses such as floating-point errors and inability to produce truly random numbers. Attempts to find vulns in hardware or OS hosting the crypto.

25
Q

Frequency Analysis and the Ciphertext Only Attack

A

count the number of times each letter appears in ciphertext.

26
Q

Chosen Ciphertext

A

attacker can decrypt chosen portions of ciphertext message and use decrypted portion to discover the key.

27
Q

Chosen Plaintext

A

attacker can encrypt plaintext and then analyze ciphertext output.

28
Q

Meet in the Middle

A

Attacker uses known plaintext. Plaintext encrypted using every possible key. Ciphertext then decrypted with every key. When match is found, pair represents both portions of double encryption.

29
Q

Birthday

A

(aka collision attack or reverse hash matching) - seeks to find flaws in one to one nature of hashing. Substitute in digitally signed communication a different message that produces same message digest.