CoboCards App FAQ & Wünsche Feedback
Sprache: Deutsch Sprache
Kostenlos registrieren  Login

Hol' Dir diese Lernkarten, lerne & bestehe Prüfungen. Kostenlos! Auch auf iPhone/Android!

E-Mail eingeben: und Kartensatz kostenlos importieren.  
Und Los!
Alle Oberthemen / Infomatik / IT Sicherheit

IT-Security TU Graz (64 Karten)

Sag Danke
1
Kartenlink
0
[Wireless Security] Cryptographic Goals
CIA:
  • Confidentiality
  • Integrety
  • Authentication

and
  • non-repudiation
Tags: Wireless Security
Quelle:
2
Kartenlink
0
What is the birthday paradox?
Antwort
Tags: Wireless Security
Quelle:
3
Kartenlink
0
How many people are necessary so that with probability > 50% two have their birthdays on the same day?
23
Tags: Wireless Security
Quelle:
4
Kartenlink
0
Why is WEP considered to be insecure?
Antwort
Tags: Wireless Security
Quelle:
5
Kartenlink
0
How can we attack WPA2?
Antwort
Tags: Wireless Security
Quelle:
6
Kartenlink
0
Why do we have to care about buffer overflows?
Antwort
Tags: Wireless Security
Quelle:
7
Kartenlink
0
Should we design cryptographic protocols ourselves?
No :)
Tags: Wireless Security
Quelle:
8
Kartenlink
0
If I am the owner of a root certificate, can I create a certificate for www.google.com?
Antwort
Tags: Key Establishment
Quelle:
9
Kartenlink
0
Die Bürgerkarte
Antwort
Tags: Key Establishment
Quelle:
10
Kartenlink
0
Rplay Attack
Antwort
Tags: Key Establishment
Quelle:
11
Kartenlink
0
Kerberos
Antwort
Tags: Key Establishment
Quelle:
12
Kartenlink
0
Woman-in-the-Middle Attack
Antwort
Tags: Key Establishment
Quelle:
13
Kartenlink
0
PGP and X.509
Antwort
Tags: Key Establishment
Quelle:
14
Kartenlink
0
X.509 is secure
Antwort
Tags: Key Establishment
Quelle:
15
Kartenlink
0
Revocation
Antwort
Tags: Key Establishment
Quelle:
16
Kartenlink
0
Did we solve the key distribution problem?
Antwort
Tags: Key Establishment
Quelle:
17
Kartenlink
0
Trust
Antwort
Tags: Key Establishment
Quelle:
18
Kartenlink
0
Check whether (x,y) is a valid point (E given).
Antwort
Tags: Finite Field and ECC
Quelle:
19
Kartenlink
0
Let E be given. Compute all valid points defined over F 7.
Antwort
Tags: Finite Field and ECC
Quelle:
20
Kartenlink
0
Perform a point addition/doubling. Formulas are given.
Antwort
Tags: Finite Field and ECC
Quelle:
21
Kartenlink
0
Perform a generic point multiplication.
Antwort
Tags: Finite Field and ECC
Quelle:
22
Kartenlink
0
Why do we need asymmetric cryptography?
Antwort
Tags: DH-KE & Elgamal
Quelle:
23
Kartenlink
0
What is one of the major goals of asymmetric cryptography?
Antwort
Tags: DH-KE & Elgamal
Quelle:
24
Kartenlink
0
What is the Discrete Logarithm Problem?
Antwort
Tags: DH-KE & Elgamal
Quelle:
25
Kartenlink
0
What is the Diffie-Hellman Problem?
Antwort
Tags: DH-KE & Elgamal
Quelle:
26
Kartenlink
0
What are the similarities of the Diffie-Hellman key exchange and the Elgamal encryption?
Antwort
Tags: DH-KE & Elgamal
Quelle:
27
Kartenlink
0
ElGamal: Why do two identical messages not lead to two identical ciphertexts?
Antwort
Tags: DH-KE & Elgamal
Quelle:
28
Kartenlink
0
Why is it important not to reuse ephemeral keys?
Antwort
Tags: DH-KE & Elgamal
Quelle:
29
Kartenlink
0
Why do we need to use a hash function in DSA?
Antwort
Tags: DH-KE & Elgamal
Quelle:
30
Kartenlink
0
What is Euler's Phi Function and Fermat's Little Theorem?
Antwort
Tags: RSA in practice
Quelle:
31
Kartenlink
0
Which (four) mathematics oriented attacks on RSA do you know?
Antwort
Tags: RSA in practice
Quelle:
32
Kartenlink
0
What are the problems of RSA regarding its "determinism"?
Antwort
Tags: RSA in practice
Quelle:
33
Kartenlink
0
What measures does RSA-OAEP use to secure textbook RSA?
Antwort
Tags: RSA in practice
Quelle:
34
Kartenlink
0
How can you improve the performance of RSA?
Antwort
Tags: RSA in practice
Quelle:
35
Kartenlink
0
[Physical Attacks] What cryptographic goals do you want to achieve?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
36
Kartenlink
0
What logical attacks did we discuss?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
37
Kartenlink
0
What applications need security?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
38
Kartenlink
0
What optimization principals do we want to achieve?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
39
Kartenlink
0
What is the problem with throughput?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
40
Kartenlink
0
What is the problem with power?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
41
Kartenlink
0
What is the problem with quality?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
42
Kartenlink
0
What is the problem with chip area?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
43
Kartenlink
0
Which criteria do we use to categorize physical attacks?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
44
Kartenlink
0
Is there perfect physical security?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
45
Kartenlink
0
What is a practical goal for such a security critical device?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
46
Kartenlink
0
What are sources of leaking timing information?
Antwort
Tags: Passive Physical Attacks
Quelle:
47
Kartenlink
0
What are the two basic requirements to avoid the leakage of timing information?
Antwort
Tags: Passive Physical Attacks
Quelle:
48
Kartenlink
0
Which transformations are performed within the final round of AES?
Antwort
Tags: Passive Physical Attacks
Quelle:
49
Kartenlink
0
What is the difference between a simple power analysis (SPA) and a differential power analysis (DPA) attack?
Antwort
Tags: Passive Physical Attacks
Quelle:
50
Kartenlink
0
How does the DPA on AES work?
Antwort
Tags: Passive Physical Attacks
Quelle:
51
Kartenlink
0
Why is it important that the power traces are aligned?
Antwort
Tags: Passive Physical Attacks
Quelle:
52
Kartenlink
0
Name and explain three countermeasures against power analysis attacks.
Antwort
Tags: Passive Physical Attacks
Quelle:
53
Kartenlink
0
How is it possible to induce a fault?
Antwort
Tags: Active Physical Attacks
Quelle:
54
Kartenlink
0
Error detection codes.
Antwort
Tags: Active Physical Attacks
Quelle:
55
Kartenlink
0
How many bits can you recover by applying a safe-error attack, per induced fault?
Antwort
Tags: Active Physical Attacks
Quelle:
56
Kartenlink
0
How does the Bellcore attack work?
Antwort
Tags: Active Physical Attacks
Quelle:
57
Kartenlink
0
What are two countermeasures to secure RSA?
Antwort
Tags: Active Physical Attacks
Quelle:
58
Kartenlink
0
How does AES work?
Antwort
Tags: Active Physical Attacks
Quelle:
59
Kartenlink
0
How does a fault attack on AES work, when you toggle the LSB before the final round S-box operation?
Antwort
Tags: Active Physical Attacks
Quelle:
60
Kartenlink
0
How many plaintext / ciphertext pairs do you need to recover the full key?
Antwort
Tags: Active Physical Attacks
Quelle:
61
Kartenlink
0
How many plaintext / ciphertext pairs do you need when you insert an error at the end of the 7th round?
Antwort
Tags: Active Physical Attacks
Quelle:
62
Kartenlink
0
Explain how textbook RSA works. How do you generate keys, how do you encrypt a message, how do you decrypt a message? Explain this in full detail
Antwort
Tags:
Quelle: 20140414
63
Kartenlink
0
Name and explain two methods (in detail), with which the speed of the RSA exponentiation can be improved.
Antwort
Tags:
Quelle: 20140414
64
Kartenlink
0
Why is it a bad idea to share the RSA modulus n with other users? Discuss the scenario, when the attacker is IN the group of users who share the same modulus. Also, discuss the scenario, when the attacker is NOT a member of the group of users who share the same modulus.
Antwort
Tags:
Quelle: 20140414
Kartensatzinfo:
Autor: Mihael
Oberthema: Infomatik
Thema: IT Sicherheit
Schule / Uni: TU Graz
Ort: Graz
Veröffentlicht: 21.07.2014
Tags: 2014
 
Schlagwörter Karten:
Alle Karten (64)
Active Physical Attacks (9)
DH-KE & Elgamal (8)
Finite Field and ECC (4)
Introduction to Physical Attacks (11)
Key Establishment (10)
Passive Physical Attacks (7)
RSA in practice (5)
Wireless Security (7)
Missbrauch melden

Abbrechen
E-Mail

Passwort

Login    

Passwort vergessen?
Deutsch  English