• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/45

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

45 Cards in this Set

  • Front
  • Back

What is kerckhoff's principle?

The security of a cryptosystem should not rely on
a secret that’s hard (or expensive) to change


What does mode of operation of block cipher indicate?

• The choice of what to do with multiple blocks is called the mode of operation of the block cipher

ECB(Electronic code book) is a mode of operation, what is special about it?

encrypts each successive block separate (patterns can repeat)

Alice can just claim that Bob made up the
message M, and calculated the tag T himself, what is this called?

repudiation

What's the difference between digital signature, and a Mac?

Bob can prove these facts to a third party (additional property not satisfied by a MAC).


What is tunneling?

Tunnelling is the sending of messages of one protocol inside (that is, as the payload of) messages of another protocol, out of their usual protocol nesting sequence


Is tcp-ip tunneling? Why?

So TCP-over-IP is not tunnelling, since you’re
supposed to send TCP (a transport protocol) over IP (a network protocol; one layer down in the stack)

Is ip-over-tcp tunneling? why?

But IP-over-TCP is tunnelling (going up the stack
instead of down), as are IP-over-IP (same place in the stack), and

Is PPP over DNS tunneling? Which layers does it involve?

PPP (a link layer protocol; bottom of the stack) over DNS (an application layer protocol; top of the stack)

______ is Useful for connecting a single laptop to a home network


Transport mode

In transport mode only ______ are encrypted
and authenticated

• Only the contents of the original IP packet

____ is Useful for connecting two networks

Tunnel mode

In VPN tunnel mode ______ are encrypted

• The contents and the header of the original IP packet are
encrypted and authenticated; result is placed inside a
new IP packet destined for the remote VPN gateway

How does a message that Alice sends via Tor look like?

EK1(EK2(EK3(M)))

How does a response from website to Alice look like? (she's using Tor)

EK1(EK2(EK3(R)))

What level of nimity do these have?


Government ID, SIN, credit card #, address


Verinymity

What level of nimity do these have?


• Noms de plume, many blogs

• Persistent pseudonymity

What level of nimity do these have?


• Prepaid phone cards, loyalty cards

Linkable anonymity

What level of nimity do these have?


• Cash payments, Tor

Unlinkable anonimty

In SSH what is the MAC?

the session key

There are two main ways to authenticate with ssh, what are they?


1) Send a password over the encrypted channel
• The server needs to know (a hash of) your password



2) Sign a random challenge with your private signature
key
• The server needs to know your public verification key

What's the benefit of using type I remailers?

remailers removed the central point of trust

What's the disadvantage of using type II remailers?

you have to use a specific email client to construct constant-length messages

• In order to use public-key encryption and digital
signatures, Alice and Bob must each have:


• A public encryption key
• A private decryption key
• A private signature key
• A public verification key

In public-key encryption and digital signature, Alice sends a message to Bob, what's the process?

To send a message to Bob, Alice will:
• Write a message
• Sign it with her own signature key
• Encrypt both the message and the signature with
Bob’s public encryption key
• Bob receives this, and:
• Decrypts it using his private decryption key to yield
the message and the signature
• Uses Alice’s verification key to check the signature

What does Database integrity involve?

Database integrity
• Logical and physical integrity



(data not corrupted + recover from physical problems)

Name four things that can help element integrity in database

* Access control


* Element Check


* Change log


* Error detection codes

Referential integrity ensures that there are no
_______

dangling foreign keys

What is the difference between security and precision in the context of databases?

Security: Forbid any queries that access sensitive data,
even if (aggregated) result is no longer sensitive



Precision: Aggregated result should reveal as much
non-sensitive data as possible

Compute query Q(c) (not -allowed) based on Q(T) (allowed) if q(c) matches fewer than k records

q(C) = q(C or T) + q(C or not T) − q(S)
• Use right-hand side for computing q(C) if q(C)
matches fewer than k records

Compute query Q(c) (not -allowed) based on Q(T) (allowed) if q(c) matches more than N-k records

• q(C) = 2 ∗ q(S) − q(not C or T) − q(not C or not T)
• Use right-hand side for computing q(C) if q(C)
matches more than N − k records

What is suppression in databases?

• Suppression
• Suppress sensitive data from result

What is concealing in databases?

• Concealing
• Answer is close to actual value, but not exactly

What is the n-item k-percent rule?


• For the set of records that were included in the result, if there is a subset of n records that is responsible for over
k percent of the result, omit the n records from result

• A query K has -differential privacy if for all
datasets D and D' :




(where D and D' differ in at most one row)

the probability that K(D) has a particular output is at most


(e^ε) * the probability that K(D') has this output

• Keeping existence hidden can lead ______ meaning _____


polyinstantiation



to having
multiple records with the same primary key, but
different sensitivity

What happens in non-truman semantics?

• Non-Truman semantics:


the DBMS can reject queries that
ask for data the user is not
allowed to access


What's the k-anonymity rule?

• Ensure that for each released record, there are at least k − 1 other released records from which
record cannot be distinguished (where k ≥ 2)

Quasi-identifier should be chosen such that
_____

released records do not allow any re identification based on any additional data that attacker might have

Give an example of Homogeneity attack

Homogeneity attack
• If you know Bob (902**,196*-*-*) is in the table, then
Bob has cancer.


Give an example of background attack

• If you know Dave (904**,195*-*-*) is in the table, and that his risk for heart disease is very low, then Dave has cancer

L-diversity property


For any quasi-identifier, there should be at least "L" “well-represented” values of the sensitive fields

Possibly still not good enough: t-closeness [2007]


Ensure that the distributions of the values for any quasi-identifier are within t of the distribution for the whole table

What are three things that should be in the policy?

goal


responsibility


commitment

risk exposure = _____ x _____

= probability x impact