Week 9 Flashcards
(15 cards)
Classification of hacker
- Intersection ( eavesdrop information)
- Interruption (denial of service)
- Modification (modify content)
- Fabrication ( insert counterfeit information)
- Invasion ( steal information of node)
Process of network attack
- Hacker gathers information (footprinting, scanning, enumeration)
- Gains access to become network member
- Launches attack
Methods of hacker become network
- Brute force attack
- Address spoofing
- Replay packet
- Session hijacking (watch on-going connection, send disassociation to client, use same parameter as client to act as client)
Type of attack
- Denial of service attack
- Man in the middle attack
- Data modification attack
Security goals
Confidentiality
Integrity
Authentication
Non- repudiation
Certification
Access control
Availability
Explain cryptosystem
System where sender conceal data into cipher text using encryption
Receiver transforms cipher text back to plain text using decryption
Explain caesar cipher
venegere cipher
Transposition cipher
Caesar cipher: shift by 3 letter
Venegere: use a repeating key
Transposition: convert plaintext into matrix, then read based on key order and column
Explain multiple letter cipher and playfair cipher
Playfair works by, getting key, place into matrix, order it first by key, then remaining alphabet. Then break words into pair, then draw rectangle, picking value of opposite sides.
If same row, move most left to right, then pick right value.
if same column, pick value below it.
Hardest cipher to crack
Block cipher
Stream cipher
Difference between block cipher and stream cipher
Block cipher: process as a block at a time
Stream cipher: Process messages as bit/byte when en/decrypt. Real time
Explain fiestel cipher
Word, key, round function
1. Input block split into two half
2. For L1, get from R0. For R1, get R0 value, undergo permutation using round function, XOR combine w L0
To decrypt, get result then do same process, but reverse key
Explain DES
Data Encryption Standard
Its built upon fiestel cipher, with caviat is that it include a function which expand the bit, exclusive OR operation, then subsitute it into original bit amount
Proceed with fiestel cipher process
Explain AES
Advanced Encryption Standard
Used to replace DES
Consist of 128,192,256 bits keys
How does the AES algorithm work
- Convert the 128-bit plaintext into 4 by 4 matrix
- Add round key into matrix using XOR
- Loop, subbytes, shift row, random column, add round key
- Final loop, subbytes, shift row, add round key
How does decryption in AES algorithm work
- Add round key into matrx using XOR
- Loop, inverse shift row, inverse sub types, add round key, inverse random column.
- Inverse shift row, inverse sub types, add round key