CoboCards App FAQ & Wishes Feedback
Language: English Language
Sign up for free  Login

Get these flashcards, study & pass exams. For free! Even on iPhone/Android!

Enter your e-mail address and import flashcard set for free.  
Go!
All main topics / Infomatik / IT Sicherheit

IT-Security TU Graz (64 Cards)

Say thanks
1
Cardlink
0
[Wireless Security] Cryptographic Goals
CIA:
  • Confidentiality
  • Integrety
  • Authentication

and
  • non-repudiation
Tags: Wireless Security
Source:
2
Cardlink
0
What is the birthday paradox?
Antwort
Tags: Wireless Security
Source:
3
Cardlink
0
How many people are necessary so that with probability > 50% two have their birthdays on the same day?
23
Tags: Wireless Security
Source:
4
Cardlink
0
Why is WEP considered to be insecure?
Antwort
Tags: Wireless Security
Source:
5
Cardlink
0
How can we attack WPA2?
Antwort
Tags: Wireless Security
Source:
6
Cardlink
0
Why do we have to care about buffer overflows?
Antwort
Tags: Wireless Security
Source:
7
Cardlink
0
Should we design cryptographic protocols ourselves?
No :)
Tags: Wireless Security
Source:
8
Cardlink
0
If I am the owner of a root certificate, can I create a certificate for www.google.com?
Antwort
Tags: Key Establishment
Source:
9
Cardlink
0
Die B├╝rgerkarte
Antwort
Tags: Key Establishment
Source:
10
Cardlink
0
Rplay Attack
Antwort
Tags: Key Establishment
Source:
11
Cardlink
0
Kerberos
Antwort
Tags: Key Establishment
Source:
12
Cardlink
0
Woman-in-the-Middle Attack
Antwort
Tags: Key Establishment
Source:
13
Cardlink
0
PGP and X.509
Antwort
Tags: Key Establishment
Source:
14
Cardlink
0
X.509 is secure
Antwort
Tags: Key Establishment
Source:
15
Cardlink
0
Revocation
Antwort
Tags: Key Establishment
Source:
16
Cardlink
0
Did we solve the key distribution problem?
Antwort
Tags: Key Establishment
Source:
17
Cardlink
0
Trust
Antwort
Tags: Key Establishment
Source:
18
Cardlink
0
Check whether (x,y) is a valid point (E given).
Antwort
Tags: Finite Field and ECC
Source:
19
Cardlink
0
Let E be given. Compute all valid points defined over F 7.
Antwort
Tags: Finite Field and ECC
Source:
20
Cardlink
0
Perform a point addition/doubling. Formulas are given.
Antwort
Tags: Finite Field and ECC
Source:
21
Cardlink
0
Perform a generic point multiplication.
Antwort
Tags: Finite Field and ECC
Source:
22
Cardlink
0
Why do we need asymmetric cryptography?
Antwort
Tags: DH-KE & Elgamal
Source:
23
Cardlink
0
What is one of the major goals of asymmetric cryptography?
Antwort
Tags: DH-KE & Elgamal
Source:
24
Cardlink
0
What is the Discrete Logarithm Problem?
Antwort
Tags: DH-KE & Elgamal
Source:
25
Cardlink
0
What is the Diffie-Hellman Problem?
Antwort
Tags: DH-KE & Elgamal
Source:
26
Cardlink
0
What are the similarities of the Diffie-Hellman key exchange and the Elgamal encryption?
Antwort
Tags: DH-KE & Elgamal
Source:
27
Cardlink
0
ElGamal: Why do two identical messages not lead to two identical ciphertexts?
Antwort
Tags: DH-KE & Elgamal
Source:
28
Cardlink
0
Why is it important not to reuse ephemeral keys?
Antwort
Tags: DH-KE & Elgamal
Source:
29
Cardlink
0
Why do we need to use a hash function in DSA?
Antwort
Tags: DH-KE & Elgamal
Source:
30
Cardlink
0
What is Euler's Phi Function and Fermat's Little Theorem?
Antwort
Tags: RSA in practice
Source:
31
Cardlink
0
Which (four) mathematics oriented attacks on RSA do you know?
Antwort
Tags: RSA in practice
Source:
32
Cardlink
0
What are the problems of RSA regarding its "determinism"?
Antwort
Tags: RSA in practice
Source:
33
Cardlink
0
What measures does RSA-OAEP use to secure textbook RSA?
Antwort
Tags: RSA in practice
Source:
34
Cardlink
0
How can you improve the performance of RSA?
Antwort
Tags: RSA in practice
Source:
35
Cardlink
0
[Physical Attacks] What cryptographic goals do you want to achieve?
Antwort
Tags: Introduction to Physical Attacks
Source:
36
Cardlink
0
What logical attacks did we discuss?
Antwort
Tags: Introduction to Physical Attacks
Source:
37
Cardlink
0
What applications need security?
Antwort
Tags: Introduction to Physical Attacks
Source:
38
Cardlink
0
What optimization principals do we want to achieve?
Antwort
Tags: Introduction to Physical Attacks
Source:
39
Cardlink
0
What is the problem with throughput?
Antwort
Tags: Introduction to Physical Attacks
Source:
40
Cardlink
0
What is the problem with power?
Antwort
Tags: Introduction to Physical Attacks
Source:
41
Cardlink
0
What is the problem with quality?
Antwort
Tags: Introduction to Physical Attacks
Source:
42
Cardlink
0
What is the problem with chip area?
Antwort
Tags: Introduction to Physical Attacks
Source:
43
Cardlink
0
Which criteria do we use to categorize physical attacks?
Antwort
Tags: Introduction to Physical Attacks
Source:
44
Cardlink
0
Is there perfect physical security?
Antwort
Tags: Introduction to Physical Attacks
Source:
45
Cardlink
0
What is a practical goal for such a security critical device?
Antwort
Tags: Introduction to Physical Attacks
Source:
46
Cardlink
0
What are sources of leaking timing information?
Antwort
Tags: Passive Physical Attacks
Source:
47
Cardlink
0
What are the two basic requirements to avoid the leakage of timing information?
Antwort
Tags: Passive Physical Attacks
Source:
48
Cardlink
0
Which transformations are performed within the final round of AES?
Antwort
Tags: Passive Physical Attacks
Source:
49
Cardlink
0
What is the difference between a simple power analysis (SPA) and a differential power analysis (DPA) attack?
Antwort
Tags: Passive Physical Attacks
Source:
50
Cardlink
0
How does the DPA on AES work?
Antwort
Tags: Passive Physical Attacks
Source:
51
Cardlink
0
Why is it important that the power traces are aligned?
Antwort
Tags: Passive Physical Attacks
Source:
52
Cardlink
0
Name and explain three countermeasures against power analysis attacks.
Antwort
Tags: Passive Physical Attacks
Source:
53
Cardlink
0
How is it possible to induce a fault?
Antwort
Tags: Active Physical Attacks
Source:
54
Cardlink
0
Error detection codes.
Antwort
Tags: Active Physical Attacks
Source:
55
Cardlink
0
How many bits can you recover by applying a safe-error attack, per induced fault?
Antwort
Tags: Active Physical Attacks
Source:
56
Cardlink
0
How does the Bellcore attack work?
Antwort
Tags: Active Physical Attacks
Source:
57
Cardlink
0
What are two countermeasures to secure RSA?
Antwort
Tags: Active Physical Attacks
Source:
58
Cardlink
0
How does AES work?
Antwort
Tags: Active Physical Attacks
Source:
59
Cardlink
0
How does a fault attack on AES work, when you toggle the LSB before the final round S-box operation?
Antwort
Tags: Active Physical Attacks
Source:
60
Cardlink
0
How many plaintext / ciphertext pairs do you need to recover the full key?
Antwort
Tags: Active Physical Attacks
Source:
61
Cardlink
0
How many plaintext / ciphertext pairs do you need when you insert an error at the end of the 7th round?
Antwort
Tags: Active Physical Attacks
Source:
62
Cardlink
0
Explain how textbook RSA works. How do you generate keys, how do you encrypt a message, how do you decrypt a message? Explain this in full detail
Antwort
Tags:
Source: 20140414
63
Cardlink
0
Name and explain two methods (in detail), with which the speed of the RSA exponentiation can be improved.
Antwort
Tags:
Source: 20140414
64
Cardlink
0
Why is it a bad idea to share the RSA modulus n with other users? Discuss the scenario, when the attacker is IN the group of users who share the same modulus. Also, discuss the scenario, when the attacker is NOT a member of the group of users who share the same modulus.
Antwort
Tags:
Source: 20140414
Flashcard set info:
Author: Mihael
Main topic: Infomatik
Topic: IT Sicherheit
School / Univ.: TU Graz
City: Graz
Published: 21.07.2014
Tags: 2014
 
Card tags:
All cards (64)
Active Physical Attacks (9)
DH-KE & Elgamal (8)
Finite Field and ECC (4)
Introduction to Physical Attacks (11)
Key Establishment (10)
Passive Physical Attacks (7)
RSA in practice (5)
Wireless Security (7)
Report abuse

Cancel
Email

Password

Login    

Forgot password?
Deutsch  English