Week 10 Flashcards

(6 cards)

1
Q

What is the seven Security Goals

A
  1. Confidentiality
  2. Integrity
  3. Authentication
  4. Non-repudiation
  5. Certification
  6. Access control
  7. Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Stream Cipher

A

Real-time symmetric encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain RC4

A

RC4 is funamental Stream Cipher

Works by:

  1. Get both Stream and Key value

Key scheduling algorithm
2. Undergo iteration of whole of stream, where S[i], stream value is based on i=( value of previous step +S[iteration] +K[iteration]) mod (length of Stream). Then swap places based on computed value

Keystream generation
3. Formula should be given. Amount of time run based on length of data

Then XOR both result

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain public key cryptosystem

A

Contains two keys, one for encryption, the other for decryption
Idea is, anyone can lock it, but only secret key owner can decrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain RSA algorithm

A
  1. Pick 2 large prime number
  2. calculate n= pxq and n1=(p-1)x (q-1)
  3. Encryption key 1 <e <n1, GCD(e, n1)=1
  4. Decryption key= e^(-1)mod (n1)

It becomes,
- Public key (e, n)
-private key (d, n)

To send encrypt:
-message ^(e) mod n

Decrypt:
- message ^(d) mod n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to ensure message is not tampered?

A

Use hash function
-Ensure one way
- Low correlation
- Strong collision resistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly