Exam 1 Review - PowerPoint PPT Presentation

1 / 23
About This Presentation
Title:

Exam 1 Review

Description:

Students should show work on the exam. ... Key escrow ... system, authenticated to access escrow system, time bounded message access on unescrow ... – PowerPoint PPT presentation

Number of Views:35
Avg rating:3.0/5.0
Slides: 24
Provided by: csU70
Category:
Tags: escrow | exam | review

less

Transcript and Presenter's Notes

Title: Exam 1 Review


1
Exam 1 Review
  • CS461/ECE422 Fall 2008

2
Exam guidelines
  • A single page of supplementary notes is allowed
  • 8.5x11. Both sides. Write as small as you like.
  • Closed book
  • A calculator is allowed.
  • Students should show work on the exam. They can
    use supplementary sheets of paper if they run out
    of room.
  • Students can use scratch paper if desired.

3
Exam logistics
  • Exam will be given during normal lecture time in
    1310 DCL
  • You will be given 50 minutes to complete the exam.

4
Topics
  • Introductory definitions
  • Security Policies
  • Risk Analysis
  • Historical Cryptography
  • Symmetric Cryptography
  • Public or Asymmetric Cryptography
  • Key Management
  • Authentication
  • Access Control

5
Risk Analysis
  • Understand
  • Assets
  • Vulnerabilities
  • Threats
  • Risk
  • Qualitative vs Quantitative Analysis
  • Quantitative identifies absolute numbers for risk
    probability and asset value, so can calculate
    risk exposure, risk leverage

6
Security Policy
  • Defines what needs to be done, not how
  • How is mechanism or control
  • Organizational or natural language policies
  • Read and identify components in an organizational
    policy or standard
  • Did not cover formal policy languages

7
Historical Ciphers
  • Transposition
  • Rail cipher/N-columnar transposition
  • Substitution
  • Caesar, Vigenere, book, one-time pad, enigma
  • Language-based statistical attacks
  • Character frequency analysis
  • N-gram frequency analysis

8
Symmetric Encryption
  • Block vs stream encryption
  • P b0, b1, .. bn
  • E(P,k) E(b0, k0) E(b1, k1) ....
  • If all ki's are equal and sizeof(bi) generally gt
    1, E(P,k) is a block cipher
  • DES
  • Feistel network
  • Combination of p-boxes and s-boxes
  • 56 bit key and 64 bit block

9
Symmetric Encryption
  • AES
  • Iterative encryption
  • Multiple key sizes 128, 192, 256
  • Block size 128
  • 1 S box and various permutations

10
Block Encryption Modes
  • Described in text and section 7.2.2 of the
    Handbook of Applied Cryptography
    http//www.cacr.math.uwaterloo.ca/hac/about/chap7.
    pdf
  • Electronic Codebook (ECB)
  • Cipher Block Chaining (CBC)
  • Output Feedback (OFB)
  • Counter
  • Cipher Feedback (CFB)

11
Mode ?
Pi
Pi-1
Pi1
Ri-1
Ci-1
Ci
Ci1
12
Mode ?


13
Mode ?
k
Ek(r)
mi
r

E

?
ci
14
Mode ?
Pi
Pi-1
Pi1
Ctri1
Ctri
Ctri-1
Ci-1
Ci
Ci1
15
Multiple Encryptions
  • Double Encryption doesn't gain much
  • Meet-in-the-middle
  • Both decrypt and encrypt with test key
  • Save both and check against the other for middle
    values as you check new keys

16
Public/Asymmetric Encryption
  • Two keys
  • One key public, eases some bootstrap issues
  • Based on hard problems
  • RSA factoring composites of large primes
  • Diffie Hellman computing discrete logarithms
  • Know equations for RSA and DH
  • What values are public and what are private

17
Cryptographic hashes
  • Difference from regular checksums
  • Keyed and keyless
  • When is each appropriate
  • Brute force attack
  • Find another message with the same hash value
  • Birthday attack
  • Standard algorithms
  • SHA, MD5, block ciphers in CBC mode
  • HMAC to make keyless hash keyed

18
Key Management
  • Long lived vs session keys
  • Randomness and pseudo random
  • Basic key distribution
  • Trusted third party, public key
  • Kerberos slides in deck, but hidden
  • Certificates
  • Hierarchical and web of trust
  • Digital signatures
  • Several reasons why it is bad to encrypt first

19
Key management
  • Key storage
  • Key escrow
  • Should be integrated in to the user's crypto
    system, authenticated to access escrow system,
    time bounded message access on unescrow
  • ESS/Clipper example

20
Authentication
  • Establish ID
  • What you know
  • What you have
  • What you are
  • Spent a lot of time on passwords
  • On line vs off line attacks
  • Salt
  • Anderson's formula
  • Challenge Response
  • Biometrics

21
Access control
  • Access Control Matrix
  • Common model for encoding protection state of
    system
  • HRU commands and the safety property
  • Access Control Lists
  • ACM by column
  • Unix and windows examples
  • Capabilities
  • ACM by row
  • Protection and propagation issues

22
Access control
  • Memory Protection Rings
  • Intel implementation example

23
Good luck!
Write a Comment
User Comments (0)
About PowerShow.com