cryptography intro Flashcards

1
Q

what is cryptography

A

what it means to be mathematically secure and designing systems to achieve this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are security services

A

specific security goals we want to acheive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are some examples of security services

A

confidentiality
data integrity
data origin authentication
non-repudiation
authentication
accountability
anonymity
verifyability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

confidentiality

A

data cannot be viewed by unauthorised users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

data integrity

A

data cannot be altered without permissions and you can determine when data is being altered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

data origin authentication

A

can verify the person who created the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

non-repudiation

A

a user cannot deny previous action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

kerckhoff’s principle

A

a cryptographic system should be secure even if everything about it except the key is public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

passive attacks

A

the attacker doesnt change the data or processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are two examples of passive attacks

A

unauthorised access to data
traffic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

traffic analysis

A

can notice patterns on how entities are communicating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

active attacks

A

altering the system information in some way usually changing the data or processes that act on the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are four examples of active attacks

A

masquerade
replay
modification
denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

masquerade (active attacks)

A

pretending to be the sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

replay (active attacks)

A

the attacker intercepts the message then passes it on at some point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how can we prevent replay (active attacks)

A

digital signatures
time stamps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

modification (active attacks)

A

intercepts and changes the message

18
Q

how can we prevent modification passive attacks

A

confidentiality and integrity mechanisms

19
Q

what are the 3 types of cryptosystems

A

encryption systems
digital signatures
hashing

20
Q

what do encryption systems aim to provide

A

plaintext confidentiality

21
Q

how can the attacker discover the decryption key

A

through an exhaustive key search

22
Q

exhaustive key search

A

trying to decrypt the cipher text using every possible key until you find the right one

23
Q

how can we prevent attackers discovering the decryption key via an exhaustive key search

A

making the key so long that its computationally impractical to discover

24
Q

how is the exhaustive key search used as a bench mark for security

A

every other attack should take longer than the time it would take to complete

25
what are the 4 forms of plaintext message recovery
ciphertext only attack known plaintext attack chosen plaintext attack chosen ciphertext attack
26
ciphertext only attack
the passive attacker only knows the ciphertext
27
known plaintext attack
knows some plain and ciphertext pairs
28
in which two ways could the attacker get the plaintext
careless sender or receiver guesses the correct decryption
29
chosen plaintext attack
the attacker knows the pairs when they have chosen the plaintext
30
chosen ciphertext attack
knows the plain and ciphertext pairs when theyve chosen both has access to encryption and decryption services
31
what are the security aims of digital signatures
data integrity, origin authentication, and non-repudiation
32
what does it mean for the attacker to make a forgery
creating a valid digital signature without the key
33
selective forgery
outputting a signature for a specific message
34
existential unforgeability
without having the secret key, you shouldnt be able to forge a valid signature
35
what are some criteria for hash functions
must be a compression function must be easy to compute(efficient computation) should be infeasible to go the other way
36
compression function
for any length input the output should be the same length
37
what are some of the security criteria for hash functions
preimage resistance second preimage resistance collision resistance
38
preimage resistance
one a message has been hashed it should be computationally infeasible to get the original message hash functions should be one way
39
second preimage resistance
it should be computationally infeasibly to find another message with the same hash as a specific message
40
collision resistance
it should be computationally infeasible to find two messages with the same hash
41
birthday attacks
how many messages do we need to randomly select before there is a greater than 50% chance of collision