• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/21

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

21 Cards in this Set

  • Front
  • Back
Observe what A and B are communicating
Attacks on Confidentiality
Observe that A and B ARE communicating/How Much
Traffic Analysis
Modify Communication between A and B
Attacks on Integrity
Deny A and B from communicating
Denial of Service
How are A, B and Adversary usually modeled
Probabilistic Polynomial-Time Turing Machines (PPT)
Security Parameter
Variable Lambda measures the input in a problem
A and B effecient communication
p(lambda) for some polynomial p
lambda
key size, bigger is better
Adversary's Probability of breaking security
Directly proportional to SP (lambda) size.
Negligible Probability
A function is negligble if for every positve polynomial p there exists an N such that all lambda is greater than n. Example function v(lambda)<(1/p(lamda))
One-Way Function
easy to compute on every input but hard to invert given the image of a random input.
Collection of one-way functions
a set, each function has a domain and range.
Trapdoor one-way Function
Hard to invert unless the trapdoor is known. Can be inverted effeciently with the trapdoor but otherwise the function is one way
applications of one-way functions
make a public identifier for private info, include a digital signature with a trap door
Factors for deciding p, n, and lambda size
Life Span: How long the info must be protected. Security Margin: Computational power of attacker. Cryptanalysis: The progress of cryptography and hacking in the future.
Digital Signature
a DS scheme is a trip (G,S,V) of effeciently computable algorithms. G outputs a public key K and a private key K-1. S takes a message m and the key as an input and outputs a signature. V takes message m, the signature and public key as input and outputs a bit b. If the signature with m connects to the bits its valid.
Types of attacks against Digital Signature Schemes
Key Only Attack, Known Signature Attack, Chosen Message attack. All rely on knowing the public key obviously.
Pseudorandom Functions
Looks like a random function to anyone not knowing the key(first input) make good MAC, message authentication code shemes
Message Authentication Code
Creating MAC's rom only hash functions is desirable.
HMAC
Some confusing ass function
Cryptogaphic hash function
hash function that takes an arbitrary block of data and returns a fixed-size bit string - the cryptographic hash value such that any change to the data will change the hash value.