Cryptographic Protocols Flashcards

Lecture 18 (6 cards)

1
Q

What are Message Authentication Codes?

A

They are used to calculate a keyed hash of the message, then append it to the end of the message.
- They provide integrity and authenticity, but not confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Length Extension attacks?

A

Assumes an attacker doesn’t know k, but they do know the keyed hash at the end of the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do Length Extension attacks work?

A
  • Observe message and keyed hash message
  • Create a new attack message m|x
  • Initialise hash function with an internal state of the keyed hash message
  • Complete the hash with x to produce keyed hash attack message
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Record Layer in TLS?

A

Uses established symmetric keys and other session info, will encrypt application packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Handshake Layer in TLS?

A

Used to establish session keys, as well as authenticate either party - Usually the server using a public-key certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the steps of the TLS handshake?

A
  • Client says hello, with a random number and a list of supported cipher suites
  • Server responds with a hello, random number, chosen cipher suite and its certificate
  • Key exchange between the two parties is performed
  • Client verifies the certificate that was originally sent by computing the digital signature with the public key and private key
  • Sends conclusive finish messages before the connection is then deemed fully established
How well did you know this?
1
Not at all
2
3
4
5
Perfectly