Chapter 7 Security Flashcards
(52 cards)
5 properties of secure communication
- Secery: no one else can read message
- Integrity: msg not altered
- Authentication: verify senders identity
- Nonrepudiation: Ensuring sender cannot deny composing msg
- Availability: services remain accessible
Cryptography
Ensures all the security properties using keys
Difference of plaintext and Ciphertext
Plaintext: Original MSG
Ciphertext: Encrypted version
Two main types of cryptography
Symmetric Key Cryptography
Public key cryptopgraphy
Symmetric key Cyrptography
Both sender and reciever share the same secret key (Ke = Kd)
Public Key Cryptography
Each user has their own key pai and the publick ey is disclosed so that anyone can encrypt messages that the user can decrypt
How is symmetric key cyptograhpy made?
Based on complex combinations of bit or byte level subsititions and transpositions
Substituition Cipher
Preserves order of plaintext symbols but disgusing them through replacmenet with others
Transpoisiton Cipher
Leaves plaintext symbols unchanged but reorders them
DES
Data Encryption Standard: Encrypts 64-bit blocks using 56-bit key
Triple DES
Address the problem of keys being too short encrypt with K1 then apply K2 and then encrypt with K1 again
AES
Advanced Encrpytion Standard: Encrypts 128-bit blocks
ECB mode
Electronic Code Block: Independently encrypt each block of bits from plaintext
CBC
Cipher block chaining mode: encrypt by finding the bitwise OR of the first plaintext block and a vector. This is too complicated
Stream Cipher
Use key and IV to generate a sequence of bits called keystrean which is XOR’d with plaintext
One-Time Pad
Key is a random bit string of length >= to that of the plain text.
Quantum Cryptography
Transmitting a one-time pad over a network in a secure manner using photon polarization
RSA Algorithm
Public Key aglorithm where = m^e mod n
What makes RSA Secure
Difficulty of factoring large composite numbers
Why do we use padding in RSA
To never produce the same cipher text
RSA used for digital signatures
Sender signs with private key D and verifeir checks with a public key
Message Digest
A fixed-length hash of a messaged used for signing instead of a full message
Secure Public Key Distribution is important because?
If an attacker provides a fake key, they could decrypt or impersonate messages
DNS + DNSSEC help with public key distribution how?
Keys are stored in DNS records and signed using DNSSEC to prevent forgery