Intro to Cybersecurity Flashcards
(39 cards)
4 types of assets
- hardware
- software
- data
- communication links
7 steps of the design process
1) ID assets
2) ID stakeholders
3) ID adversaries
4) define attack surface
5) research each path of attack surface
6) design solutions for each path
7) analyze the proposed solution (effectiveness and whether its worthwhile)
5 components of the NICE Framework
- Identify
- Protect
- Detect
- Respond
- Recover
NICE Framework - Identify
ID your situation (id assets, stakeholders, adversaries, and attack surface)
NICE Framework - Protect
design, analyze, implement and pen test solutions
NICE Framework - Detect
constantly monitor both external and internal signals to allow for timely detection
NICE Framework - Respond
what is the response protocol (what actions do you take) when something is detected
NICE Framework - Recovery
- contain the damage
- assess the damage
- follow a recovery strategy
Equation for Caesar’s Cipher and number of possible keys
c = (m + k) mod 26
26 possible keys
brute force cost for breaking cipher
[#of possible keys * (cost per decryption attempt + cost of verification)] / parallelization factor
Affine Cipher equation and number of possible keys
c = am + b
m = (c-b) * a**-1 mod 26
26 x 12 = 312 because phi(26) = 12 so then there are 26 possible values for b and 12 possible values for a
Shannon’s Principles (3)
- define the objective in a rigorous manner
- determine your assumptions
- prove that your methods satisfy the objective given the stated assumptions
equation and assumptions for one-time pad
c = m (XOR) k
- m and k are encoded in binary
- k is never recycled
- the key is sampled from a uniform random distribution (its truly random)
DES specifications
key size: 56 bits
message size: 64 bit blocks
# of rounds: 16
key size is TOO small susceptible to brute forcing
Meet-in-the-middle attack
for a double DES with keys k1 and k2.
A brute force decryption of m for all possible k1 is done in parallel to a brute force decrpytion of c for all possible k2.
adversary then can verify by looking for where Enc(m, k1) = Dec(c, k2)
Since the encrpytion and decryption are done in parallel, we only get 257 bits of security (2 * 256)
Breaking Triple DES
assume the output of DES #1 is z1 and the output of DES #2 is z2
Do a brute force encryption of m for all k1 to obtain all possible z1 and brute force decryption of c for all k3 to get all possible z2 (2**57)
Then for each of the 2**56 z1 we have to a do a brute force encryption for all k2. (done in series with the brute forcing to obtain all z1)
257 * 256 = 2**113
AES specifications
key size: 256 bits
block size: 128 bits
rounds: 14
How to encrypt with CBC
IV (XOR) b1 then encrypt to produce c1.
c1 (XOR) b2 then encrypt to produce c2
and so on
how to decrypt CBC
decrypt c2 and then
c2 (XOR) c1 to get b2
in parallel
decrypt c1 and then
c1 (XOR) IV to get b1
how to encypt in Counter mode
Enc(IV) (XOR) b1 = c1
Enc(IV + 1) (XOR) b2 = c2
decrypt in Counter mode
Enc(IV) (XOR) c1 = b1`
Enc(IV + 1) (XOR) c2 = b2
2 Downsides of CBC
- encryption is done in series which makes it MUCH slower
- errors propagate through
1 Downside of counter mode
-since blocks are encrypted in parallel, the sender and receiver of the message need to be synchronized. Without synchronization there is no way to ensure that encrypted blocks are received in the correct order
3 benefits of Counter mode
- only need 1 function to encrypt and decrypt (because they are done the same way)
- parallel encryption prevents the propagation of errors
- all of the values Enc(IV + i) can be pre-computed!