User Authentication Flashcards

(14 cards)

1
Q

What are the 3 steps of offline dictionary attacks?

A

1) attacker gets a password file 2) attacker gets an encrypted/hashed password 3) attackers tries password from dictionary of common passwords, and compares with the encrypted/hashed one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are 3 countermeasures to offline attacks?

A

Store hash of password, add password to salt, keep passwords away from userIDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 3 properties of Hash Functions?

A

1) Non reversible (use hash to hash, cannot use to unhash) 2) Fixed size produced 3) Hash produced is unique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are 4 steps to hash salting?

A

1) Get password 2) Add salt 3) Compute hash 4) Store hash and salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Rainbow Tables?

A

Precalculated tables for reversing hash functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are 2 positives of Rainbow Tables?

A

Rainbow tables do not take much space, brute force takes much more time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two steps of User Authentication?

A

Identification, Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are three approaches to authentication?

A

What you know (password), what you have (a key), who you are (fingerprint)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attack against Password Authentication: What is Phishing as an attack? Countermeasure to this Phishing?

A

Make a fake website that user puts password into. Server-side authentication so you know server is legit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attack against Password Authentication: What is Interception as an attack? Countermeasure to this Interception?

A

Attacker intercepts password being written. Encrypt communication between users and websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are 2 measures against password brute force attacks?

A

Lock out after certain amount of attempts, Password policies (e,g, minimum password length)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are 2 ways of measuring the effectiveness of a password?

A

Password Strength, Entropy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is Password Strength calculated?

A

|Alphabet| ^ length of password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is Entropy calculated?

A

n * log base 2 |a|

How well did you know this?
1
Not at all
2
3
4
5
Perfectly