Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
34 Cards in this Set
- Front
- Back
Key distribution |
How to have secure communications in general without having to
|
|
digital signatures |
– how to verify a message |
|
3 categories of Public Key Applications |
– encryption/decryption (provide secrecy)
|
|
Study RNA Encryption/Decryption be able to do an example |
Do it, right now. |
|
4 options for symmetric key distribution |
1. A can select key and physically deliver to B |
|
Session key |
temporary key
|
|
Master key |
used to encrypt session keys |
|
What are the possible approaches to attacking RSA? |
brute force key search (infeasible given size |
|
Hybrid Key Distribution |
retain use of private-key KDC |
|
Public Key Annoucement |
users distribute public keys to recipients or |
|
Publicly Available Directory |
can obtain greater security by registering |
|
Public-Key Authority |
improve security by tightening control over |
|
Public key certificates |
certificates allow key exchange without |
|
X.509 Authentication Services |
• defines framework for authentication services |
|
CA Heirarchy |
if both users share a common CA then they are |
|
Message Authentication |
- protecting the integrity of a message |
|
Security Requirements for Message Authentication |
• disclosure |
|
Message Encryption for Authentication |
• message encryption by itself also provides |
|
MAC |
generated by an algorithm that creates a |
|
What is a MAC? |
An MAC is not a digital signature, it is a cryptographic checksum that -- condenses a variable-length message M |
|
Requirements for MAC |
need the MAC to satisfy the following: |
|
Hash Fucntion |
condenses an arbitrary message to a fixed size. usually assume that the hash function is |
|
Requirements for Hash Functions |
1. can be applied to any sized message M |
|
One-way property |
given h is infeasible to find x s.t. H(x)=h |
|
Weak collision resistance |
given x is infeasible to find y s.t. H(y)=H(x) |
|
Strong collision resistance |
is infeasible to find any x,y s.t. H(y)=H(x) |
|
Keyed Hash functions as MAC |
want a MAC based on a hash function |
|
HMAC |
uses hash function on the message: |
|
CMAC |
Cipher-based Message Authentication Code |
|
Digital Signatures |
have looked at message authentication |
|
Digital Signature Attacks and Forgeries |
• attacks |
|
Digital Signature Requirements |
• must depend on the message signed |
|
Direct Digital Signatures |
involve only sender & receiver |
|
What are the 5 principle services provided by PGP? |
Authentication, Confidentiality, Compression, E-mail compatibility, and Segmentation |