CySec Foundations Teil 2
CySec Foundations Teil 2
CySec Foundations Teil 2
Set of flashcards Details
Flashcards | 210 |
---|---|
Language | Deutsch |
Category | Computer Science |
Level | University |
Created / Updated | 31.07.2020 / 10.08.2020 |
Weblink |
https://card2brain.ch/box/20200731_cysec_foundations_teil_2
|
Embed |
<iframe src="https://card2brain.ch/box/20200731_cysec_foundations_teil_2/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
Give two examples of authenticated encryption with associated data (AEAD) protocols.
- AES Galois Counter Mode (GCM)
- ChaCha20_Poly1305
In which situation whould ChaCha20 be prefered over AES?
in mobile phones -> CPUs don't have AES instruction set -> ChaCha20 is faster than AES
What is the problem with ciphertexts that haven't been secured with a MAC?
The integrity cannot be guaranteed
What is the problem with protocols that don't use the PKI for authentication?
vulnerable to man-in-the-middle attacks
During the TLS handshake, the server sends the client a signature in the ServerKeyExchange packet. How can the client decrypt that signature?
client has to use public key contained in the digital certificate of the server
What parts of a certificate are confidential and should be encrypted?
the private key with which the encryption happens
How does a data assurance package (e.g. Tripwire) provide some secondary virus detection capabilities?
they hash values for each file stored on a protectd system
-> filechange results in hashchange
-> triggers integrity alert
Which character is dangerous in context of SQL Injection attacks?
the single quote: '
Consider an adversary sniffing the network (where a Kerberos v5 auth system is implemented) and seeing the ticket that the ticket granting server (TGS) sent to client C. The adversary knows the identity of C. What prevents the adversary from using the ticket to obtain the service in place of C?
The timestamp makes certain that replay attacks do not work. The ticket itself cannot be modified since he does not know the respective key for decryption and re-encryption of any eventual new ticket.
Given g, p, b as Bobs private key and a as Alices private key, what is the formula for the shared secret?
shared secret = g ^ ( b * a ) mod p