LECTURE NOTE 5 Flashcards

(38 cards)

1
Q

the principle of digital signatures

A
  1. verifying the sender’s identity (authentication)
  2. ensuring the message’s integrity (integrity)
  3. preventing the sender from denying their involvement (non-repudiation)
    These principles collectively contribute to secure and trustworthy
    communication in digital transactions and exchanges
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

any action that compromises the security of information

A

security attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

mechanism that is designed to detect, prevent, or recover from a security attack. might operate by itself, or with others

A

security mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

example of security mechanisms

A

Cryptography,
Message digests and digital signatures,
Digital certificates,
Public Key Infrastructure (PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Refer to the different services available for maintaining the security and
safety of an organization

A

secuirty services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

name the four core security services

A

confidentiality
message/data integrity
message/data authentication
non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

confidentiality is provided by using primarily _____________ and less frequently ______________________

A
  1. symmetric siphers
  2. aymmetric encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

integrity and message authentication are provided by ————— and _______________

A

1.digital signatures
2. message authentication codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Non-repudiation can be achieved with __________________

A

digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is identification/Peer entity authentication

A

it is a security service that establishes and verifies the identity of an entity, such as a person or a computer. asks the question “who are you”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is access control/authorization

A

it is a security service that restricts access to resources to privileged entities. it decides “who can do what”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is auditing

A

it ia security service that provdes evidence of security-relevant activities and keeps logs of certain events. it provides a proof of “ who did what”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is availability

A

it is a security service that ensures that the system is accessible and usable on demand by auhtrozed users according to atented goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is physical security

A

a security service that provides protection against physical tampering and responds to physical tampering attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is anonymity/privacy

A

it is a security service that provides protection against the discovery and misuse of identity. it also addresses the questions of “ what happens whne we do not want to be identified”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the goal of digital signatures

A

they function like a signature like function for the electronic world. so mimic conventional (paper) signature

17
Q

a technique that binds a person/entity to
the digital data.This binding can be independently verified by receiver as well as any third
party

A

digitial signatures

18
Q

cryptographic tools serve as the electronic equivalent
of handwritten signatures and provide the same level of authentication,
integrity, and non-repudiation in electronic transactions and
communications.
6 / 34

A

digital signatures

19
Q

what are the differences between conventional signatures and digital signatures; name the four

A

inclusion
verification method
relationship
duplicity

20
Q

explain the difference between conventional and digital signatures —> inclusion

A

a conventional signature –> on a document or message
digitals signature –> attached or added as digital code. embedded in the document or message; not apart of document

21
Q

explain the difference between conventional and digital signatures —> verfication emthod

A

conventional signature –> comparing signature to known sample
digital signatures —> verified by mathematical algortihms that chekc the signature agaisnt the orginal document

22
Q

explain the difference between conventional and digital signatures –> relationship

A

convetional signature –> one to many relationship; so all documents would ahve same signautre if signed by same entity
digital signatures –> one to one; modify one bit, we will have idfferent signature for the message

23
Q

explain the difference between conventional and digital signatures –> duplicity

A

convetional signatures –> easily dulciated or forged
digital sginatues —> hard to forge or tamer due to complex encrytpion technolgy

24
Q

what is the aim of a signature

A

it is to prove to anyone that a message originated at (or is approved by) a particular user

25
symmetric key cryptogrphy
two suers can share a secret key k. the reciver fo the message between the two users can verfy the message came from othe ruser. but user c -- unkown cannot prpve message came from sending user, it could be from reciving user
26
only one user has the private key
Public key cryptography can provide signature
27
digitial signature process
1. the sender uses a signed algorithm to sign the message 2. the message and signature are sent to the reciver 3. the receiver receives the message and the signautre and applies the verfying algorithm to the combination 4. if result is true --- accepted; others rejected message
28
A digital signature can directly provide message authentication, message integrity, and nonrepudiation but for ________________________ we still need encrytion/decryption
message confidentiality
29
how is message authntication provded by digital signature
the verfifier has the corresponding public key fo the sender, which assures that the signature has been creater by the sener who has the correspondin secrret private key
30
how is message integrity provided by digital signature
a digitial signature will change is any modfications ahve been made, there the verification process will flag it a false and reject it
31
how is non repudiation provded by digital signature
the digital signature acts like a" signature" to authenticate. assumes only the singer has the knwolege of signaure key
32
what can a digital singature not provuide
confidentiality
33
name 5 digital signature schemes
RSA Digital Signature Scheme ElGamal Digital Signature Scheme Schnorr Digital Signature Scheme Digital Signature Standard (DSS) Elliptic Curve Digital Signature Scheme
34
a type of attack that can occur with digital signatures --- an attacker creatin ga message that has the same digital signature as a legitimate message
existential forgery
35
Technique used in digital signature algorithms to add additional bits to a message before it is signed.
padding
36
what is an undesirable feature of an autimated verfication process
it does not reconginze forgery
37
the modules of the rsa signature schemes should be at tleast _______________ bu=its long
2048
38