COSC362 Exam Notes

CIA: Confidentiality, Integrity, Availability

Maths

Groups:

Finding Generators:

Field F\mathbb{F}: set with two operations:

Chinese Remainder Theorem:

Euler function:

Fermat Primality Test:

Miller-Rabin test:

Returns probable prime for composite numbers with a maximum probability of 25%.

Discrete logarithm problem:

Classical Encryption

Confidentiality: reading message requires key.

Authentication: creating message requires key.

Attack classes:

Kerckhoff’s Principle: the only thing the attacker doesn’t know is the key.

Systems:

Modern Encryption

Hash Functions/MACs

Properties:

Birthday paradox:

Merkle-Damgård Construction:

Standards:

MACs:

HMAC:

Encryption and MAC:

Block Cipher

Key sizes and equivalents for symmetric algorithms (block ciphers), factoring modulus (e.g. RSA’s nn), discrete logarithm key (exponent) and group (pp), elliptic curve, hashes: https://www.keylength.com/en/4/

Product cipher: chain simple functions together, each using its own key.

Iterated cipher: product cipher but each round uses the same function using a key derived from a master key (using key schedule).

Substitution-Permutation Network (SPN):

Feistel Cipher:

Shannon:

DES:

AES:

Block Modes of Operation

ECB (Electronic Code Book):

CBC (Cipher Block Chaining)

CTR (Counter Mode):

Authentication/Integrity

Tag TT of message MM is unforgeable - impossible to produce T=MAC(M,K)T = \mathrm{MAC}(M, K) without KK.

CBC-MAC:

CMAC (Cipher-Based MAC):

Authenticated Encryption

Data fits into one of two buckets:

This is called AEAD - Authenticated Encryption with Associated Data.

CCM (Counter with CBC-MAC): If hh collision resistant, whole hash function is collision resistan

GCM (Galois Counter Mode):

RNGs

Seed obtained from true RNG; used in PRNG/deterministic random bit generator (DRBG).

DRBGs should have:

CTR_DRBG:

Dual_EC_DRBG:

Synchronous Stream Ciphers:

Public Key Cryptography

One-way function:

RSA:

Diffie-Hellman:

Authenticated Diffie-Hellman:

Static Diffie Hellman: aa and gag^a are the long-term private/public keys

Elgamal Cryptosystem:

Digital Signatures

Unforgeability: infeasible to generate a valid signature for any message without key.

Provides non-repudiation.

RSA signatures:

DSA signatures:

Public Key Infrastructure

Trusted certification authority (CA) (CA public key required by clients) issues/signs and revokes certificates.

Certificates (e.g. X.509 v3) contain:

Usually signed with RSA since RSA verification is faster than ECDSA.

Revocation: each CA has list of revoked certificates.

Key Management

Key management phases:

Mutual vs unilateral authentication:

Pre-Shared Keys:

With symmetric keys:

With asymmetric keys:

TLS

MAC:

Encryption:

Authenticated-Encryption:

Protocols:

DH Handshake:

RSA: client generates PMS and encrypts with server’s public key. No forwards secrecy.

Anonymous DH: against passive eavesdropping.

Attacks:

IPSec

Services:

Architectures:

Protocols:

Modes of operation: ESH/AH operate in:

Email

Actors and systems:

Link security:

End-to-end security:

TODO 17. Malware and Cyber Attacks