protocols part 2 - public key Flashcards

(31 cards)

1
Q

why is key establishment needed?

A

protocol possible as A and B share a key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

how to set up a session key

A

using key establishment protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

how to ensure secure communication is happening

A

use eachothers public key:
- only one party has private keys everyone else encrypt using public key , no one can decrypt using parties.
use a trusted third party(TTP)
- ttp that trusted between the two principals
certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

notation for needham schroeder public key protocol

A
  1. A →B : EB (Na, A)
  2. B →A : EA(Na, Nb)
  3. A →B : EB (Nb)
    Nb and Na used to then generate a symmetrivc key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how do we know for sure A is A and B is B in
(As in they are making sure they are talking yo eachother )
1. A →B : EB (Na, A)
2. B →A : EA(Na, Nb)
3. A →B : EB (Nb)

A
  1. shows A that it is b as inly b could have decrypted the previous message and sent nonce back with new nonce
  2. shows b A ia A as only A could have decrypted the message and sent nonce back
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is public key encryption notation in protocol

A

E_x(-)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what attack is needham schroeder public key protocol susceptible to

A

man in the middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Needham-Schroeder-Lowe Public Key Protocol notation

A
  1. A →B : EB (Na, A)
  2. B →A : EA(Na, Nb, B)
  3. A →B : EB (Nb)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is B in B →A : EA(Na, Nb, B)
in Needham-Schroeder-Lowe Public Key Protocol

A

b is identity message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is the Needham-Schroeder-Lowe Public Key Protocol secure
1. A →B : EB (Na, A)
2. B →A : EA(Na, Nb, B)
3. A →B : EB (Nb)

A

▶ A and B mutually authenticate each other.
▶ The attack where Elvis intercepts and impersonates
Bob is no longer possible.
▶ Mutual Authentication — Alice and Bob both verify
each other.
▶ Protection Against MITM — Attackers cannot
impersonate Bob.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. A →B : EB (Na, A)
  2. B →A : EA(Na, Nb, B)
  3. A →B : EB (Nb)
  4. B →A : {M}key_(Na,Nb)
    can adversary read the message encrypted with key_(Na,Nb)
A

no . secure against adversary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. A →B : EB (Na, A)
  2. B →A : EA(Na, Nb, B)
  3. A →B : EB (Nb)
  4. B →A : {M}key_(Na,Nb)
    can the government read the message encrypted with key_(Na,Nb)
A

after protocol runs , governement can force people to handover private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is foward secrecy

A

A protocol has Forward Secrecy if it keeps the message secret from an attacker
who has:
▶ A recording of the protocol run.
▶ The long-term keys of the principals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

why does forward secrecy matter?

A

Protection against:
▶ Governments that can force people to give up their keys.
▶ Hackers that might steal private keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

describe station to station protocol

A

uses public key infrastructure
adds digital signatures and encryption of signatures whith Diffie Hellman shared key secret to achieve the goals:
each party has their own key
prevent eavesdroppers from learning about the message or identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

STS notation

A
  1. A →B : gx
  2. B →A : gy, {SB (gy, gx )}gxy
  3. A →B : {SA(gy, gx )}gxy
  4. B →A : {M}gxy
17
Q

notation for signing in protocols

18
Q

why is STS secure?

A

▶ x, y , gxy are not stored after the protocol run.
▶ A and B’s keys don’t let the attacker read M.
▶ STS ensures Forward Secrecy.

19
Q

what is a problem with STS?

A

have to verify eachothers public keys
()how does b know a is a and a know b is b)?

20
Q

solutions to verifying eachothers public key is STS protocol

A

meet face to face to securely exchange keys
use a pre - shared key mechanism

TTP (trusted third party) -> signs identities and public keys ehich creates certificates-> ensures they can verify eachother public keys

21
Q

why add certificates to STS protocol

A

A →B : gx
2. B →A : gy, CertB , {SB (gy, gx )}gxy
3. A →B :CertA, {SA(gy, gx )}gxy
▶ The ”full” STS protocol includes
certificates for A and B.
▶ Certificates contain public keys
signed by a Trusted Third Party (TTP).
▶ Alice and Bob don’t need to know
each other’s public key beforehand

22
Q

how does the Needham-Schroeder Key Establishment Protocol work?

A
  1. A →S : A, B, Na
  2. S →A : {Na, B, Kab, {Kab, A}Kbs }Kas
  3. A →B : {Kab, A}Kbs
  4. B →A : {Nb}Kab
  5. A →B : {Nb + 1}Kab

▶ S is a Trusted Third Party (TTP) that helps establish a shared key Kab.
▶ S encrypts the session key separately for Alice and Bob.
▶ Alice and Bob mutually authenticate using nonces Na and Nb.
▶ Ensures that only Alice and Bob know Kab.

23
Q

what are key establishment goals

A

key freshness
key exclusivity
good key

24
Q

what is key freshness

A

key established is new (from TTP or uses a new nonce)

25
what is key exclusivity
key only known to principals in the protocol
26
what is good key
key is both fresh and exclusive
27
what are authentication goals
entity authentication far - end operative once authentication
28
what is far - end operative
A knows B is active For instance, B might have signed a nonce generated by A, e.g. ▶ A →B: Na ▶ B →A: SB (Na) Not enough on its own (e.g. Needham-Schroeder protocol).
29
what is Once authentication
A knows B wishes to communicate with A B might have name A in message B -> A: S_B(A)
30
what is the highest goal in protocols
A protocol provides Mutual Belief in a key K for Alice with respect to Bob if, after running the protocol, Bob can be sure that: * K is a good key with A * Alice can be sure that Bob wishes to communicate with Alice using K * Alice knows that Bob believes that K is a good key for B.
31
what is entity authentication
A knows that B is currently active and wants to communicate with A. e.g. ▶ A →B: Na ▶ B →A: SB (A, Na)