Distributed Systems Flashcards
What is the name of the protocol that uses an iterative application of the Diffie-Hellman algorithm for distributed group key management?
The protocol that uses an iterative application of the Diffie-Hellman algorithm for distributed group key management is called the Tree-based Group Diffie-Hellman (TGDH) protocol.
What are the advantages of the Needham-Schroeder protocol for dynamic pairwise key establishment?
1.The Needham-Schroeder protocol is simple and efficient for establishing pairwise keys in a distributed system.
2.It provides mutual authentication between the communicating parties.
What are the disadvantages of the Needham-Schroeder protocol for dynamic pairwise key establishment?
1.The protocol assumes that the communication channel between the group controller and the users is secure, which may not always be the case.
2.It relies on a trusted group controller for key distribution, which can be a single point of failure.
3.The protocol is vulnerable to replay attacks if timestamps or sequence numbers are not used.
What is the difference between a multi-signature and a group signature algorithm?
A multi-signature algorithm requires all or a certain number of users to sign a message, and anyone can verify the signatures and know who the signers are. It is often used in scenarios where joint approval from multiple parties is required.
A group signature algorithm allows any group member to sign a message on behalf of the group, and anyone can verify the signature but cannot identify the signer. It is often used in scenarios where signer anonymity is required.
What is the purpose of a proof-of-work in a blockchain-based distributed ledger
The purpose of a proof-of-work in a blockchain-based distributed ledger is to deter denial of service attacks and other service abuses such as spam on a network by requiring some work from the service requester, usually meaning processing time by a computer.
How can Shamir’s secret sharing be used to implement a (k,n) threshold signature algorithm?
Shamir’s Secret Sharing can be used to implement a (k,n) threshold signature algorithm in the following way:
*The secret (e.g., a private key) is split into n shares using Shamir’s Secret Sharing.
Each of the n users holds one share.
*To sign a message, each user signs the message with their share of the secret.
*Any k out of n signatures can be combined to produce the original signature.
*The original signature can be verified with the public key corresponding to the secret.
*This way, any k out of n users can jointly sign a message, but any fewer than k users cannot.
What is the role of a group controller in the Needham-Schroeder protocol?
In the Needham-Schroeder protocol, the group controller (GC) plays a crucial role. It is responsible for generating and distributing keys to the users. The GC acts as an intermediary, enabling users to establish pairwise keys with each other.
How does the tree-based group Diffie-Hellman (TGDH) protocol work?
The Tree-based Group Diffie-Hellman (TGDH) protocol is a decentralized approach to manage keys in distributed systems. It allows users to create a group key using the Diffie-Hellman algorithm iteratively. The users are organized in a binary tree, where each user is a leaf node. Each node in the tree (including the leaf nodes) holds a group key, which is the result of the Diffie-Hellman operation between the keys of its child nodes. When a user wants to join or leave the group, only the keys of the nodes on the path from the user to the root need to be updated.
What are the advantages of centralized key management in distributed systems?
Simplicity and efficiency. The group controller can easily distribute keys and handle authentication.
What are the disadvantages of centralized key management in distributed systems?
Single point of failure (the group controller), potential bottleneck in large systems, and trust issues (all users must trust the group controller).
What are the advantages of decentralized key management in distributed systems?
No single point of failure, better scalability, and does not require trust in a single entity.
What are the disadvantages of decentralized key management in distributed systems?
More complex to implement, and key updates (due to users joining or leaving) can be more computationally intensive.
What is the purpose of Shamir’s Secret Sharing in the context of distributed systems?
Shamir’s Secret Sharing is a method by which a secret can be divided into parts, giving each participant its own unique part. The unique property of this method is that you need a minimum number of parts to reconstruct the whole secret. In the context of distributed systems, it can be used to implement secure multi-party computations and threshold cryptosystems.
How does a blockchain-based distributed ledger ensure the integrity and authenticity of transactions?
Blockchain uses cryptographic hash functions to ensure the integrity of transactions. Each block contains a hash of all its transactions, and each new block contains the hash of the previous block, creating a chain of blocks. This makes it nearly impossible to alter a transaction once it has been added to the blockchain. For authenticity, blockchain uses public-key cryptography. Transactions are signed with the sender’s private key, and anyone can verify the signature with the sender’s public key.
What is the role of miners in the operation of a blockchain-based distributed ledger?
Miners play a crucial role in the operation of a blockchain-based distributed ledger. They validate and add new transactions to the blockchain. They do this by solving a complex mathematical problem (proof-of-work), which requires significant computational resources. Once a miner solves the problem, they add the new block of transactions to the blockchain. In return for their work, miners are rewarded with cryptocurrency.
How does a multi-signature wallet enhance the security and control of funds in a blockchain-based system?
A multi-signature wallet requires multiple parties to sign a transaction before it can be executed. This adds an extra layer of security because even if one party’s private key is compromised, the attacker cannot execute transactions without the other required signatures. It also provides better control of funds, especially in an organization, as it requires consensus before funds can be spent.
What is the difference between a linear secret sharing scheme and a threshold secret sharing scheme?
In a linear secret sharing scheme, all shares are required to reconstruct the secret. In a threshold secret sharing scheme, any subset of shares of a certain size (the threshold) can reconstruct the secret. The latter is more flexible and can tolerate the loss or unavailability of some shares.
How can the storage space and bandwidth required for a blockchain-based distributed ledger be optimized?
There are several ways to optimize the storage space and bandwidth required for a blockchain-based distributed ledger1. One way is through “pruning” the blockchain, which involves removing certain parts of the data that are no longer needed (like spent transactions). Another way is through the use of more efficient data structures, like Merkle trees, which can store large amounts of data compactly and securely.
What are some applications of group signatures in distributed systems?
Group signatures are useful in any scenario where anonymity is important. For example, they can be used in electronic voting systems to ensure that votes are anonymous but still verifiable. They can also be used in anonymous credential systems, where users can prove membership in a group without revealing their identity. Another application is in vehicular ad hoc networks (VANETs), where vehicles can send anonymous but authenticated messages to each other for traffic safety and efficiency.
What operations must be supported for groups in Security of Distributed Systems?
User join, User leave, User eject, Group Merge, Group Partition
What are some of the reasons to use distributed security mechanisms?
Secrets are too important to be kept by one user
It is easier to trust many than one user
Robustness is an important factor if multiple users are involved
What is the main protection mechanism against eavesdropping?
Encryption
What is the name of the protocol that specifies how network traffic is encrypted?
IPSec
What is the mathematical function that transforms a message and a key into an encrypted message?
The mathematical function that transforms a message and a key into an encrypted message is called encryption function. It can be denoted as E(m,k), where m is the message, k is the key, and E(m,k) is the encrypted message.