P2L9: Security Protocols Flashcards

1
Q

What are the building blocks for Security Protocols?

A
  • Public key (asymmetric) algorithm
  • Secret key (symmetric) algorithm
  • Hash Functions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are key things to look out for in Mutual Authentication with Shared Keys?

A
  • The “challenge” (R1 & R2) sent for proving authentication shouldn’t repeat (or at least not easily) since an attack can just watch the challenge and save the response to be used later when the challenge is repeated
  • This can be done by using large random values for R1 and R2
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication can be one way. T/F

A

True, since clients need to authenticate to servers, but not other way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a reflection attack and how can it be mitigated?

A
  • A reflection attack is a man in the middle attack while two parties are authenticating, where the impersonator reflects back the answers.
  • This can be stopped by either:
    • Using two different secret keys, so Bob encrypts with R1 and Alice encrypts with R2
    • Using a different type of challenge for the initiator and responder (for example odd for initiator and even for responder)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

With public keys we can use signing to achieve mutual authentication. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a long term secret key called?

A

Master key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the problem with shared master keys and what is the solution?

A
  • They do not scale

* Key Distribution Centers (KDC) are the solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is KerberOs?

A
  • A KDC
  • Authentication and Access Control system for networks
  • Every principal has a master key
    • Humans have keys based on passwords
    • Computers have keys based on their device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the benefits to Kerberos?

A
  • Localhost doesn’t need to store passwords
  • Master key is used less, only once a day, and then Kerberos gives a session key for every day
  • Limits the exposure of the master key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly