Lecture 2 - Security Protocols Flashcards

1
Q

Simplest protocol?

A

Simply memorising the secret key or password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When is using memorisation appropriate?

A

When the key is short and easy to remember

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Second simplest protocol?

A

Writing the secret key down on a piece of paper. This means this protocol relies on the attacker having physical access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat to writing down our secret key?

A
  • losing the piece of paper
  • new copies must be secured, kept track of and updated
  • we have to destroy all copies when we are done
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Can we use a computer file to store our secret key (no encryption) ?

A

This is possible, however extremely vulnerable to attackers, while also having backups overwrite versions (all need to be protected) and the fact deleted files can be recovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an encryption program?

A

A program that takes our key in plaintext and produces a ciphertext as a result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a decryption program?

A

A program that takes a ciphertext as input and produces a plaintext as a result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What must decryption do?

A

undo the encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What must happen after we encrypt the plaintext?

A

The original plaintext document should be deleted, this includes all copies and backups. This means using encryption also has vulnerability while the plaintext is around.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a threat to the encryption and decryption algorithms.

A

Attacker potentially finding the encryption and decryption algorithms. These themselves cannot be encrypted as they must be running on the machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of a cybersecurity problem is sending secret information between 2 entities?

A

This is a confidentiality, integrity (if messaged changed before or during transmission) and potentially an availability (if someone prevents message from being received) problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the only fully safe medium of transmission.

A

Meeting in a private place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

First, worse way to use encryption for transfer of data?

A

Encrypting before sending, sending , then decrypting at source. (decryption algorithm is a secret)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is keeping an algorithm a secret bad?

A
  • algorithm designers might be at risk as they know the secret
  • peer review of public algorithm reduces flaws (it is easy to fool yourself that an algorithm is more secure than it really is)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is symmetric encryption / one-key encryption?

A

Encryption and decryption algorithms must be know by both entities. They’re typically public, however require a secret key to work. The algorithm is useless without the key. The key must be exchanged!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is asymmetric encryption?

A

Encryption based on 2 keys -> private and public. One key is used for encryption (the public one) and other for the decryption (the private one). This is a one-way communication encryption mode (until the source provides a separate set of keys).