DOC PREVIEW
Berkeley COMPSCI 161 - CS 161 Midterm Review

This preview shows page 1-2 out of 5 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

1Midterm Review (I): CryptoDawn [email protected]/Advanced Crypto• This class is a quick intro• Interested in further study– Crypto class» Formal definitions & proofs» Advanced algorithms & protocols• Class & midterm will be self-contained3Basic Background• Probability calculation as seen in hw– E.g., Birthday paradox• Basic algebric calculation as seen in hw4Attacker’s Mindset• A lot of security training is about “attacker mindset”– Given a design (e.g., protocol), find attacks• Important for designing secure systems5Security Design & Evaluation• Security goals– CIA: confidentiality, integrity, availability• Threat model– Assumptions about attacker• Security analysis6Symmetric-key Encryption• What security goal does it achieve?– Confidentiality• Threat model– Known ciphertext attack– Known plaintext attack– Chosen plaintext attack (CPA)– Chosen ciphertext attack (CCA)• One-time pad– How does it work?– What security property does it achieve?» Attacker without computation limitation– Requirement for security» Key is same length as message» Cannot reuse key7Ciphers• Stream cipher– How does it work?– What’s the difference btw stream cipher & one-time pad?» Stream cipher is secure assuming attacker is polynomial time bounded• Block cipher– Modes of operation» How does each mode work?» Disadvantage of ECB• Same plaintext always encrypt to same ciphertext» Security requirements for CBC, OFB, CTR• Cannot reuse IV8Asymmetric-key Crypto• Advantages over symmetric-key crypto• Disadvntages over symmetric-key crypto– Performance overhead• Additional requirements– PKI• RSA– How does it work?– Why is textbook RSA not a secure encryption scheme?» Deterministic, short-plaintext attack9Hash Function• Security properties– Preimage resistance– 2nd-preimage resistance– Collision resistance– What do they mean and when to use which one?10Message Authentication Code (MAC)• Security property– Unforgeability» What does it mean?• What security goal does it achieve?– Integrity11Digital Signature• Security property– Unforgeability• What security goal does it achieve?– Data integrity & non-repudiation• How to compare MAC with Digital Signature?• Additional requirements– PKI• RSA signature scheme12Authentication & Key Distribution• Attacks on security protocols– Active attacker model– Should be able to spot simple attacks like in Needham-Schroeder • Diffie-Hellman key agreement– What’s man-in-the-middle attack?• Password authentication protocol– What’s a dictionary attack?– Given a protocol, should be able to tell if it is vulnerable to dictionary attack• Do not need to know how each protocol works in detail13Random Number Generation• Two steps– TRNG (true random number generator)» What sources are good and what sources are bad?– PRNG (cryptographically secure pseudorandom number generator)• Important for many security applications– Generating IV, keys, etc.14Secret Sharing• Definition of (n,n) and (n,t) threshold scheme• How do they work?• Should be able to solve problems like in hw• Zero-knowledge proof– Out of


View Full Document

Berkeley COMPSCI 161 - CS 161 Midterm Review

Documents in this Course
Rootkits

Rootkits

11 pages

Load more
Download CS 161 Midterm Review
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view CS 161 Midterm Review and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view CS 161 Midterm Review 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?