NIS Chapter 03 Flashcards

(46 cards)

1
Q

what is an unbounded medium?

A

a communication medium which has no inherent physical limitations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

define cipher

A

a process that converts plain text into a ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are symmetric algorithms? Give three examples of such

A

WEP, TKIP, CCMP

A key is shared between both encrypting and decrypting party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is it important to have a secure way of sharing the key?

A

since the key is shared, the key needs to be kept secret otherwise there is no point to the encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is asymmetric encryption ?

A

a type of encryption method that has a private key and a public key. One for encryption and one for decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what technique does a stream cipher use?

A

plaintext is encrypted bit by bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a keystream?

A

This is a psuedorandom cipher bit stream that is combined with the plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is WEP encryption?

A
  • a type of stream cipher
  • that uses the RC4 stream cipher to generate a keystream
  • and uses xor to combine the plain text and generated stream
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a block cipher?

A
  • ## takes in a fixed size length of data and encrypts it to the same length
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is block ciphering a symmetric or asymmetric ciphering scheme?

A

symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the downside of putting a specific block through multiple iterations of encryption in order to increase security?

A

performance will be affected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 2 parts of the RC4 cipher?

A

The PRG and KSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do the 2 parts of the RC4 work together? (4)

A
  • a key is ran through the KS
  • Which produces a state vector
  • state vector is fed into the PRG which permutes/rearranges the vector
  • XOR the resultant with the plaintext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What was the general use case of the RC4 cipher?

A

weak hardware/lazy developers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is RC4 a stream cipher / block cipher?

A

stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What makes RC5 different from RC4? (2)

A
  • variable block, variable and #rounds
  • block cipher instead of stream
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why is the Data Encryption Standard considered insecure>

A
  • small key size
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

4 facts about DES

A
  • block cipher
  • 64 key size
  • 56 effective lenght
  • 16 rounds on each block
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is the difference between DES and 3DES

A

it is essentially DES run 3 different times using 3 keys

20
Q

What are the different key options for 3DES

A
  • all keys are the same, all keys are unique, 2 keys are unique
21
Q

3 facts of AES

A
  • supports 3 key sizes
  • used as a security standard
22
Q

What 3 encryption methods operate in the 2 layer of the OSI model?

A

CCMP, TKIP, WEP

23
Q

What is the structure of 802.11 data frames?

24
Q

What is the payload of an 802.11 data frame reffered to as?

25
What are the 3 intended goal of WEP?
- confidentiality - access control through static key - data integrity through checksum
26
What is one major similarity between WEP and TKIP?
they both use the RC4 cipher
27
What is the purpose of the RC4 cipher in encryption schemes?
used to generate a a stream cipher to XOR the plaintext
28
What is an IV in context of WEP?
- a randomly generated bits that are combined with the secret key and used as seeding material for the RC4 cipher
29
What is the difference between ICV and IV
ICV is used to check the integrity of of the plaintext, while IV is part of the seeding material for the RC4
30
Draw the WEP encryption process
-
31
Where is one of the weakness of WEP found concerning IV
in IV, a new IV is created for each data frame but there are only so many different IV combinations, that the values end up being reused
32
Name 4 WEP encryption weaknesses
- IV collision attacks - Weak key (RC4 generates weak keys) - reinjection to accelerate IV collision attack - Bit flipping (weak ICV)
33
Why was TKIP created?
To serve as a temporary replacement for WEP that wouldn't need any HW upgrades to implement
34
How does TKIP modify WEP?
- Temporal keys: keys are dynamically allocated via a 4 way handshake instead of a static key - Sequencing: uses sequencing in order to avoid reinjection attacks - Key mixing: key mixing is used to create stronger seeding material for RC4 which avoids IV collisions - has stronger integrity because MIC protects against bit flipping attacks
35
TKIP countermeasures?
- MIC failures are able to be logged so they can be examined - 60 second shutdown after 2 MIC failures - new temporal keys
36
What is CCMP
a security protocol that was designed to replace WEP and TKIP
37
What commonality between TKIP and WEP is different with CCMP?
AES is used as a block cipher instead of the RC4 streaming cipher
38
In order to use AES, what must be predefined before encryption begins?
the methods for converting between messages and blocks during encryption and decryption or the "mode of operation" needs to be defined
39
How does the ECB mode of operation work?
- each block is encrypted independently and the padding is added as needed. - the same block generates the same cipher
40
How does the CTR mode work?
an arbitrary block is encrypted and XORed with the plaintext to produce the cipher text. identical blocks can produce different values
41
What are the features of the AES in counter mode?
- allows for a block cipher to be treated as a stream cipher - can be encrypted in parallel -
42
What security service does CCMP provide?
- integrity through CBCMAC - confidentiality \ (CTR) -authentication through keys - access control
43
What are the inputs used by the CCMP integrity and encryption process?
- Temporal keys: PTK (unicast) and GTK(group and multicast) Packet Number: like the TKIP sequence #, protects from injection/replay - Nonce: a nonce is a value used to ensure the uniqueness of the encryption keys and initialization vectors (IVs) - 802.11 data frame - AAD used to verify integrity
44
What do organisations that need higher end security typically?
Proprietary implementation that require custom sw installation
45
Draw the WEP, WPA and WPA2 table
-
46
Compare TKIP, WEP and CCMP in a table
-