Network Security Flashcards

1
Q

What is the goal of confidentiality in network security?

A

The goal of confidentiality is to ensure that only the sender and intended receiver can understand the message contents. This is typically achieved through encryption by the sender and decryption by the receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is authentication in the context of network security?

A

Authentication is the process by which the sender and receiver confirm each other’s identities to ensure that communications are secure and trustworthy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe a passive attack in network security.

A

A passive attack involves monitoring the traffic being sent to try to learn secrets, like eavesdropping or snooping, without the user’s knowledge. It is difficult to detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is meant by message integrity in network security?

A

Message integrity refers to the measure taken to ensure that a message is not altered in transit or after receipt without detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a denial of service attack?

A

A denial of service (DoS) attack aims to make resources (like a server or bandwidth) unavailable to legitimate traffic by overwhelming the resource with bogus traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is symmetric key cryptography?

A

In symmetric key cryptography, both the sender and receiver share the same secret key, which is used both to encrypt and decrypt messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Data Encryption Standard (DES)?

A

DES is an influential symmetric-key encryption algorithm developed in the early 70s that uses a 56-bit key and processes 64-bit plaintext blocks through a series of operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What replaced DES and why?

A

The Advanced Encryption Standard (AES) replaced DES because it provides stronger security through longer key lengths (128, 192, or 256 bits) and is efficient in processing data in 128-bit blocks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is AES and its significance?

A

AES (Advanced Encryption Standard) is a symmetric-key NIST standard that replaced DES. It is used globally and was adopted by the U.S. government due to its robust security features that render brute force decryption impractical with current technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is public key cryptography?

A

Public key cryptography is an encryption method where the sender and receiver do not share a secret key. Instead, each participant has a pair of keys: a public key known to everyone and a private key known only to the recipient of the messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the main components of a public key encryption system?

A

In a public key system, there are two main components: an encryption algorithm that uses a public key and a decryption algorithm that uses a corresponding private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does RSA encryption work?

A

RSA encryption involves choosing two large prime numbers, computing their product (n), and a totient (z). A public exponent (e) and a private exponent (d) are then determined. The public key is (n, e) and the private key is (n, d). To encrypt a message (m), compute c = m^e mod n. To decrypt, compute m = c^d mod n.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the significance of the modulus operation in RSA?

A

The modulus operation ensures that the calculations of encryption and decryption stay within manageable bounds and are computationally feasible even for very large numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is it difficult to break RSA encryption?

A

Breaking RSA encryption typically requires factoring a very large number (n), which is the product of two large primes (p and q). Factoring such a large number is computationally intensive and currently infeasible with conventional technology, making RSA secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How are symmetric keys used in conjunction with public key cryptography in practice?

A

Due to the computational intensity of public key operations, they are often used to exchange a symmetric session key securely. Once both parties have the symmetric key, they switch to the faster symmetric key cryptography for regular communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What modular arithmetic properties are essential for RSA?

A

Essential properties include the ability to add, subtract, and multiply under modulo operations, which facilitate the encryption and decryption processes by ensuring results remain within the set range.

17
Q

Why does the RSA algorithm work?

A

RSA works because of properties of modular arithmetic, where the operations of raising messages to the power of the public and private keys, under modulo n, are inverses of each other. This means encrypting with the public key and then decrypting with the private key (or vice versa) retrieves the original message.

18
Q

What are the challenges of implementing RSA?

A

Key challenges include selecting appropriate key sizes to prevent security vulnerabilities, managing key distribution and storage securely, and handling the computational complexity, especially for very large data transfers.

19
Q

How is the public and private key pair generated in RSA?

A

The pair is generated by first selecting two large prime numbers. The public key exponent is chosen such that it has no common factors with (p-1)(q-1), and the private key exponent is its modular multiplicative inverse.

20
Q

What are the key steps in generating an RSA public/private key pair?

A

The steps are: 1) Choose two large prime numbers, p and q.

2) Compute n = pq and z = (p-1)(q-1).

3) Choose an exponent e that is relatively prime to z.

4) Determine d such that (ed mod z = 1). The public key is (n, e) and the private key is (n, d).

21
Q

What is a digital signature?

A

A digital signature is a cryptographic technique used to verify the authenticity and integrity of a message, software, or digital document. It’s analogous to a hand-written signature but is verifiable and non-forgeable.

22
Q

How does Bob digitally sign a message to Alice?

A

Bob signs a message by encrypting it with his private key. This creates a “signed” message that can be verified by anyone who has Bob’s public key.

23
Q

How can Alice verify a digitally signed message from Bob?

A

Alice can verify the signature by decrypting the message using Bob’s public key. If the decrypted message matches the original message sent, it confirms that the message was signed by Bob and has not been altered.

24
Q

What does non-repudiation mean in the context of digital signatures?

A

Non-repudiation means that the sender (Bob) cannot deny having signed the message, as only his private key could have created the signature that can be verified with his public key.

25
Q

Describe the process Alice uses to send a secure email to Bob.

A

Alice generates a random symmetric key (KS), encrypts the message with KS for efficiency, then encrypts KS with Bob’s public key. She sends both the encrypted message (KS(m)) and the encrypted key (KB(KS)) to Bob.

26
Q

How does Bob decrypt the secure email sent by Alice?

A

Bob uses his private key to decrypt and recover the symmetric key (KS). He then uses KS to decrypt the message (KS(m)) to recover the original message (m).

27
Q

How does Alice ensure sender authentication and message integrity in her secure email to Bob?

A

Alice digitally signs the message by hashing it and then encrypting the hash with her private key. She sends this digital signature along with the message. Bob can verify the signature by decrypting it with Alice’s public key and comparing it with a hash of the received message.

28
Q

How are digital signatures used in secure email communication to provide secrecy, sender authentication, and message integrity?

A

Alice uses her private key to digitally sign the message for authentication and integrity, encrypts the message content with a symmetric key for secrecy, and encrypts the symmetric key with Bob’s public key to ensure that only Bob can decrypt it.

29
Q

What cryptographic keys does Alice use when sending a secure email?

A

Alice uses three keys: her private key for signing the message, Bob’s public key for encrypting the symmetric key, and a newly created symmetric key (KS) for encrypting the message itself.

30
Q

What are the benefits of using both symmetric and asymmetric encryption methods in secure email communication?

A

This dual approach leverages the efficiency of symmetric encryption for encrypting the actual message and the security of asymmetric encryption for safely exchanging the encryption key, ensuring both confidentiality and ease of decryption by the intended recipient.