What is the CIA triad?
Prevention of unauthorized disclosure of information
Prevention of unauthorized modification of information
Prevention of unauthorized withholding of services & resources
What is vulnerability, threat and attack?
Vuln: weakness in system that can be exploited
Threat: potential exploitation of vuln
Attack: attempted exploitation of vuln
What are the 3 types of cryptography?
Symmetric, Asymmetric, Hashing
What are examples of symmetric cryptography?
Substitution: replace character with another according to pattern
Transposition: character shifted in regular pattern to different positions
How to ensure cryptography works?
Ensure secrecy is in the key only.
What is the problem with symmetric cryptography?
Need to share key between sender & receiver.
What is asymmetric cryptography?
What are two ways of asymmetric authentication?
What are one-way functions?
One way functions are when it is computationally infeasible to get private key from the public key.
What are three techniques to break ciphers?
Bruteforce -> try all possible keys
Frequency analysis -> based on English text structure, focus on digraphs & trigraphs
Known plaintext -> need access to crypto engine (side channels), inject known plaintext and observe output cipher text.
What are hashing functions?
One way function that takes arbitrary length input and convert them into fixed length outputs.
Same input always result in same hash.
What are the properties of secure hashes?
What is a digital signature system?
Hash of a document encrypted with sender’s private key (signed/authenticated) and recipient decrypt the encrypted hash and check it against the hash of the document to see if it matches.