Week 9 Flashcards

(15 cards)

1
Q

Classification of hacker

A
  1. Intersection ( eavesdrop information)
  2. Interruption (denial of service)
  3. Modification (modify content)
  4. Fabrication ( insert counterfeit information)
  5. Invasion ( steal information of node)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Process of network attack

A
  1. Hacker gathers information (footprinting, scanning, enumeration)
  2. Gains access to become network member
  3. Launches attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Methods of hacker become network

A
  1. Brute force attack
  2. Address spoofing
  3. Replay packet
  4. Session hijacking (watch on-going connection, send disassociation to client, use same parameter as client to act as client)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type of attack

A
  1. Denial of service attack
  2. Man in the middle attack
  3. Data modification attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security goals

A

Confidentiality
Integrity
Authentication
Non- repudiation
Certification
Access control
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain cryptosystem

A

System where sender conceal data into cipher text using encryption
Receiver transforms cipher text back to plain text using decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain caesar cipher
venegere cipher
Transposition cipher

A

Caesar cipher: shift by 3 letter
Venegere: use a repeating key
Transposition: convert plaintext into matrix, then read based on key order and column

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain multiple letter cipher and playfair cipher

A

Playfair works by, getting key, place into matrix, order it first by key, then remaining alphabet. Then break words into pair, then draw rectangle, picking value of opposite sides.
If same row, move most left to right, then pick right value.
if same column, pick value below it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hardest cipher to crack

A

Block cipher
Stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Difference between block cipher and stream cipher

A

Block cipher: process as a block at a time
Stream cipher: Process messages as bit/byte when en/decrypt. Real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain fiestel cipher

A

Word, key, round function
1. Input block split into two half
2. For L1, get from R0. For R1, get R0 value, undergo permutation using round function, XOR combine w L0

To decrypt, get result then do same process, but reverse key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain DES

A

Data Encryption Standard
Its built upon fiestel cipher, with caviat is that it include a function which expand the bit, exclusive OR operation, then subsitute it into original bit amount

Proceed with fiestel cipher process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain AES

A

Advanced Encryption Standard
Used to replace DES
Consist of 128,192,256 bits keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does the AES algorithm work

A
  1. Convert the 128-bit plaintext into 4 by 4 matrix
  2. Add round key into matrix using XOR
  3. Loop, subbytes, shift row, random column, add round key
  4. Final loop, subbytes, shift row, add round key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does decryption in AES algorithm work

A
  1. Add round key into matrx using XOR
  2. Loop, inverse shift row, inverse sub types, add round key, inverse random column.
  3. Inverse shift row, inverse sub types, add round key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly