cryptography intro Flashcards
what is cryptography
what it means to be mathematically secure and designing systems to achieve this
what are security services
specific security goals we want to acheive
what are some examples of security services
confidentiality
data integrity
data origin authentication
non-repudiation
authentication
accountability
anonymity
verifyability
confidentiality
data cannot be viewed by unauthorised users
data integrity
data cannot be altered without permissions and you can determine when data is being altered
data origin authentication
can verify the person who created the data
non-repudiation
a user cannot deny previous action
kerckhoff’s principle
a cryptographic system should be secure even if everything about it except the key is public
passive attacks
the attacker doesnt change the data or processes
what are two examples of passive attacks
unauthorised access to data
traffic analysis
traffic analysis
can notice patterns on how entities are communicating
active attacks
altering the system information in some way usually changing the data or processes that act on the data
what are four examples of active attacks
masquerade
replay
modification
denial of service
masquerade (active attacks)
pretending to be the sender
replay (active attacks)
the attacker intercepts the message then passes it on at some point
how can we prevent replay (active attacks)
digital signatures
time stamps
modification (active attacks)
intercepts and changes the message
how can we prevent modification passive attacks
confidentiality and integrity mechanisms
what are the 3 types of cryptosystems
encryption systems
digital signatures
hashing
what do encryption systems aim to provide
plaintext confidentiality
how can the attacker discover the decryption key
through an exhaustive key search
exhaustive key search
trying to decrypt the cipher text using every possible key until you find the right one
how can we prevent attackers discovering the decryption key via an exhaustive key search
making the key so long that its computationally impractical to discover
how is the exhaustive key search used as a bench mark for security
every other attack should take longer than the time it would take to complete