Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
21 Cards in this Set
- Front
- Back
Observe what A and B are communicating
|
Attacks on Confidentiality
|
|
Observe that A and B ARE communicating/How Much
|
Traffic Analysis
|
|
Modify Communication between A and B
|
Attacks on Integrity
|
|
Deny A and B from communicating
|
Denial of Service
|
|
How are A, B and Adversary usually modeled
|
Probabilistic Polynomial-Time Turing Machines (PPT)
|
|
Security Parameter
|
Variable Lambda measures the input in a problem
|
|
A and B effecient communication
|
p(lambda) for some polynomial p
|
|
lambda
|
key size, bigger is better
|
|
Adversary's Probability of breaking security
|
Directly proportional to SP (lambda) size.
|
|
Negligible Probability
|
A function is negligble if for every positve polynomial p there exists an N such that all lambda is greater than n. Example function v(lambda)<(1/p(lamda))
|
|
One-Way Function
|
easy to compute on every input but hard to invert given the image of a random input.
|
|
Collection of one-way functions
|
a set, each function has a domain and range.
|
|
Trapdoor one-way Function
|
Hard to invert unless the trapdoor is known. Can be inverted effeciently with the trapdoor but otherwise the function is one way
|
|
applications of one-way functions
|
make a public identifier for private info, include a digital signature with a trap door
|
|
Factors for deciding p, n, and lambda size
|
Life Span: How long the info must be protected. Security Margin: Computational power of attacker. Cryptanalysis: The progress of cryptography and hacking in the future.
|
|
Digital Signature
|
a DS scheme is a trip (G,S,V) of effeciently computable algorithms. G outputs a public key K and a private key K-1. S takes a message m and the key as an input and outputs a signature. V takes message m, the signature and public key as input and outputs a bit b. If the signature with m connects to the bits its valid.
|
|
Types of attacks against Digital Signature Schemes
|
Key Only Attack, Known Signature Attack, Chosen Message attack. All rely on knowing the public key obviously.
|
|
Pseudorandom Functions
|
Looks like a random function to anyone not knowing the key(first input) make good MAC, message authentication code shemes
|
|
Message Authentication Code
|
Creating MAC's rom only hash functions is desirable.
|
|
HMAC
|
Some confusing ass function
|
|
Cryptogaphic hash function
|
hash function that takes an arbitrary block of data and returns a fixed-size bit string - the cryptographic hash value such that any change to the data will change the hash value.
|