07 Cryptographic Protocols Flashcards

(8 cards)

1
Q

What else do we need for Properties of Cryptographic Protocols

A
  • Perfect Forward Secrecy and key agreement
  • Scalability
  • Avoidance of Single Points of Failures
  • Selection of algorighms used for authentication and key establishment
  • Generic authentication methods for the cryptographic protocol
  • simplicity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Protocol Try 6 do?

A

Removing the Authentication Server
- add Long-term key – changes once a day
– KA,B,Longterm is cached and trusted by A and B for sometime.
– KA,B,Longterm authenticates Diffie Hellman key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Protocol Try 7 do?

A

Generic AUTH payload and Selection of Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Protocol Try 8 do?

A

AUTH Payload Rework
– AUTH payloads are different and contain information provided by both principals
– Proposed/ chosen crypto algs are now authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a FINAL Authentication and Key establishment looks like? – 4 Goals

A
  1. Alice and Bob have a shared session key for a secure channel.
  2. Alice and Bob have agreed on the cryptographic algorithms to be used for the secure channel
  3. Mutual authentication and freshness Alice(Bob) must be able to verify that Bob participated in the protocol run and that they is alive
  4. Alice and Bob must know that K (A,B) is newly generated.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the general purpose of a X509 certificate

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to prevent Replay Attack

A

add Nonces - only accept unknown nonce
set Timestamp - have well synchronized clocks, only recently used timestamps must be memorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Forward Secrecy - what do we want to avoid

A

Long-term key leaks
If attacker has recorded previous communication, they can decrypt key transport message and data exchanged over secure channel
store now, decrypt later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly