Network Security Flashcards
(103 cards)
what is meant by message integrity
sender and receiver want to ensure a message has not altered or been tampered with in transit or afterwards without detection
what is included in a passive attack
eavesdropping or intercepting messages
what is involved in an active attack
actively inserting messages into a connection
which is not easy
what is involved in an impersonation attack
spoof source address of packet
what is involved in hijacking attack
attacker inserting themselves in the middle, both sender and receiver still think they are talking to each other
what is plain text
original data
what is encrypted version of plain text called
ciphertext
encryption function
E(P) = C
decryption function
D(C) = P
for the cryptosystem to function, what must hold
D(E(P)) = P
ie must be able to reproduce the plaintext
does the lenght of the key determine its security
no its algorithm is also a key factor
what is the key space
all the possible values the key can take
encyrption function with key
E_k(P) = C
decryption function with key
D_k(C) = P
why does having a big key space mean more security
sequentially going through every key takes too long
ie. brute force attack not worth it
how do substitution ciphers work
each letter or group of letter is replaced by another group of letters to disguise it
three ways to attack on substitution ciphers
identify commonly occurring characters
commonly occuring bigrams
domain specific buzzwords eg system, login, password
three ways to attack on substitution ciphers
identify commonly occurring characters eg vowels
identify commonly occurring bigrams/digrams eg th, ie
identify domain specific buzz words eg system, login, password etc
does substitution ciphering preserve the order of text symbols
yes
how does vigenere cipher work
26x26 matrix
pick long word as key
use first letter of key to encrypt first letter of plain text
use second letter of key to encrypt second letter of plain text
when last letter of key is used, wrap around
how to break vigenere cipher
know length of key and when rotation happens
how do transposition ciphers work
re order the symbols rather than disguising them
process of transposition cipher
pick a key
write plain text in rows under the key
re order the columns
send in column
how many keys are there in symmetric key encryption
1
all parties share the same key