Cryptographic data integrity algorithms Flashcards

(52 cards)

1
Q

what are Hash functions?

A

Functions that accepts a variable length block of data and produces a fixed size hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Are hash values public or private?

A

public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do hash functions detect?

A

changes to message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give to cryptographic hash function properties and define each.

A

1- One-Way property : computationally infeasible to find data mapping to a specific hash value
2- Collision-free property : computationally infeasible to find two data to same hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the applications of Cryptographic hash functions?

A
  • Message authentication
  • digital signatures
  • one way password file
  • intrusion detection and virus detection
  • PRF, PRNG
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is message authentication>

A

verify the integrity of the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is digital signature?

A

the hash value of a message is encrypted using the user’s private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is one way password file?

A

keeping the hash value of the password not the actual password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is intrusion and virus detection

A

Keep and check hash files on the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

h=H(x), we say that x is a ….. of h, and x is a data block whose hash function is —. the function is —

A

preimage,h,H

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Collision is:
a. one to one hash mapping
b. one to many hash mapping
c. many to one hash mapping
d. many to many hash mapping

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

State the hash function requirements.

A
  • variable input size
  • fixed output size
  • efficiency: H(x) is easy to compute for any given ‘x’ making SW and HW implementations practical.
  • preimage resistant(one way property): for given ‘h’ it is infeasible to find y in H(y) = h
  • second preimage resistant(weak collision resistant) : for given block x, it is infeasible to find y!x in H(x) = H(y)
  • Collision resistant(strong): it is infeasible to find a pair(x,y) such that H(y) = H(x)
    pseudo-randomness : Output of H meets standard tests for pseudo-randomness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

State attacks on Hash Functions

A
  • Brute force
  • cryptanalysis
  • preimage and secon preimage: find y in H(y) such that H(y) = h
  • collision resistance : determine two values with the same hash value(x and y) such the H(x)=H(y)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what determines the length of the hash code against brute force?

A

2^m/2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False:
128 bits is inadequate , 160 bits suspect

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MD4 produces a ….. bit hash value

A

160

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SHA-1 is considered :
a. secure
b. not secure

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

versions of SHA (also known as SHA-2) are:

A

SHA-256
SHA-384
SHA-512

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are message security requirements?

A

-Disclosure
-Source repudiation
-destination repudiation
-Traffic analysis
-Masquerade
-content modification
- sequence modification
-timing modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is the type that is based on a hash function

A

keyed hash functions as MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

True or False:
Hash functions are slower than MACs

A

False, Hash function are faster than MACs

22
Q

In key hashed functions , what does a hash include?

22
Q

Give the Original Proposal of key-hashed functions as Mac.

A

KeyHashed = Hash(Key|Message)

23
Q

The security of MACs can be an advantage in which type of attack?

A

Brute Force, and MACs work as MAC pairs

24
What does MAC use encryption for?and does it use the same keys
Secrecy, No, it uses separate keys for each.
24
What are the requirements for MAC?
MAC needs to satisfy the following: - Knowing a message and MAC is infeasible to find another message with the same MAC - MAC should be distributed uniformly - MAC should depend equally on all bits in a message
24
State MAC properties.
- MAC is a cryptographic checksum - it has an input data of variable length - it has a fixed sized authenticator(Output) - it uses a secret key K - MAC is many-to-one function meaning that many messages can have the same MAC, but finding these needs to be very difficult.
25
MAC is a cryptographic .....
Checksum MAC = CK(M)
26
Why do we use MAC?
For Authentication
27
True or False: MAC is a Digital Signature
False
28
What is the fixed sized block of data from MAC generated from?
a message and a secret key MAC = C(K, M)
29
What does a MAC create?
A fixed sized block
30
How does the receiver make sure that the message is not altered?
By performing a certain computation on the message and checks if it matches the MAC
30
True or False: In MAC, Encryption need not to be reversible.
True
31
When can public Key Encryption be efficient?
When the sender signs(signature) their message using their private key, and encrypts it using the public key of the receiver. this assures secrecy and authentication
31
MAC is appended to a message as a.....
Signature
32
Allows for easy replicability of embedded Hash functions
HMAC
32
What is Symmetric Message Encryption?
- Receiver knows that the sender must have created the message - Only the sender and receiver know the key used - know content cannot be altered - if a message has a suitable structure, redundancy or a checksum to detect and changes.
33
What does HMAC preserve?
the original performance of the hash function without significant degradation .
34
HMAC handles keys in a very difficult way
This statement is False, HMAC handles keys in a simple way
35
Internet Standard of HMAC
RFC2104
36
Write the whole function of HMAC
HMACK(M) = Hash[(K+ XOR opad )|| Hash[(K+ XOR ipad || M)]]
37
In HMAC what is K+?
the key padded to size opad
38
how much is the overhead of HMAC
1
38
what does the security of a HMAC depend on?
the hash algorithm
39
Attacking HMAC requires:
- brute force attack on key used - birthday attack
40
Digital Signatures provide the ability to:
- Verify the author, date and time - Authenticate message contents - Be checked by others to settle disagreements
41
In DSA , how many bits is the signature ? And how many bits is the security?
320 bits 512-1024 Respectively
42
DSA is smaller and faster than RSA
This statement is true
42
In direct digital signature, who is involved?
Sender and Receiver only.
43
Security depends on the sender/receiver's private/public key.
Sender's , private key.
44