Term
|
Definition
| Set of rules for executing a transfer; Has the objectives of liveness (e.g., A has what B had and vice versa) and safety (e.g., neither gives without getting) |
|
|
Term
|
Definition
| Protection of information systems against unauthorized access of modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users including those measures necessary to detect, document, and counter such threats |
|
|
Term
|
Definition
| Includes viruses (replicates itself as part of executable programs), worms (replicates across computers), and trojan horses (appears to do something useful but conceals malicious code) |
|
|
Term
| Four ways to protect against malicious code |
|
Definition
1. Network level - firewalls, detect anomalies 2. Operating system level - use antivirus tools, multiple levels of authorization so virus cannot execute with unbounded priveleges 3. Program execution environment level - run downloaded code in a "sandbox", run only certified or proof-carrying code 4. User level - use conservative security configurations, install only trustworthy programs |
|
|
Term
|
Definition
| Establishing that the agent has a particular identity, then authorize performance based on identity - Examples include a login to gate entry to service provider; B uses A's public key to validate signature |
|
|
Term
|
Definition
| User types in password, possession of secure device (key), or physical measurement (biometrics) |
|
|
Term
|
Definition
| Scheme designed to control knowledge effects of messages |
|
|
Term
|
Definition
| Theory and practice of designing cryptosystems |
|
|
Term
|
Definition
| Theory and practice of undermining cryptosystems |
|
|
Term
|
Definition
| The combination of cryptography and cryptanalysis - theory and practice of designing and undermining cryptosystems |
|
|
Term
| Parts of secure communication |
|
Definition
1. message (M) 2. message space (*M*) 3. plaintext - direct encoding of the original message (M) 4. Ciphertext (C) - a transformation of the plaintext 5. Ciphertext space (*C*) - language of all possible message transformations |
|
|
Term
|
Definition
| Function from message space to ciphertext space C = E(M) |
|
|
Term
|
Definition
| Function from cyphertext to message space, D(E(M)) = M |
|
|
Term
|
Definition
| Symmetric, sender and receiver share a secret (the key), and the issue is arranging the secret and maintaining its security |
|
|
Term
|
Definition
Uses a key (K) that is the same size as message (M), this method is perfectly resistent to cryptanalysis 1. E(K,M) = XOR(K,M) 2. D(K,C) = XOR(K,C) 3. D(K,E(K,M) = XOR(K,XOR(K,M) = M |
|
|
Term
|
Definition
| No shared secrets, each agent has two keys: a public key known to everyone and a private key known only to agent; Keys are related but nobody can figure out private from knowledge of public; Can encrypt for an agent knowing only its public key and can only be decrypted with knowledge of private key |
|
|
Term
|
Definition
| Easy to compute and infeasible to invert |
|
|
Term
|
Definition
| Encrypting a message with senders' private key, can be decrypted with sender's public key; typically sign with only a fingerprint, produced by one-way hash function |
|
|
Term
|
Definition
| Ciphertext only (passive), known plaintext, chosen plaintext (public-key), chosen ciphertext, rubber hose |
|
|
Term
|
Definition
| First public-key cryptosystem; most prevalent in use today; works by selecting two large random prime numbers p and q; let n = p q; public key is (e,n) and private key is (d,n); to encrypt message M: E(M) = M^e(mod n); to decrypt ciphertext C: D(C)=C^d(mod n); hinges on difficulty of deriving d from knowledge of (e,n) |
|
|
Term
|
Definition
| In one-way functions, it is an additional piece of information that would make it easy to invert |
|
|
Term
|
Definition
| a protocol participant trusted by all others; generally disinterested; sometimes called an arbitrator; can simplify protocol design but may cause delay, expense, vulnerability; e.g. key distribution center |
|
|
Term
|
Definition
| An established shared secret between A and B used only for limited time |
|
|
Term
|
Definition
1. A sends first half of encrypted message 2. B sends first half of encrypted message 3. A sends second half of encrpd message 4. B sends second half of encrpd message This way M cannot carry off agent-in-middle attack without being detected |
|
|
Term
|
Definition
| Digitally sign message certifying when signed |
|
|
Term
|
Definition
| A and B want to share an algorithm, so A commits to a secret, then B shares, then they open A's secret |
|
|
Term
|
Definition
| A and B want to share an algorithm, so A commits to a secret, then B shares, then they open A's secret |
|
|
Term
|
Definition
| Information about which knowledge is limited to specific agents |
|
|
Term
| Symmetric and Asymmetric secrets |
|
Definition
| Shared secrets, and secrets where only one agent knows but another can verify |
|
|
Term
|
Definition
| Evidence beyond identity - includes recommendation by third parties, guarantees of good behavior, and past behavior; includes credentials and policies to specify the credentials sufficient to grant operation requests |
|
|
Term
|
Definition
| Occupying resources so that other authorized users cannot be served |
|
|
Term
|
Definition
| Resides in macros/scripts that are embedded in document files; documents have executable facilities as well |
|
|
Term
|
Definition
| Automatically replicates across computers; special case of virus that does not require human action to replicate, exploits some property of the context to get itself to run |
|
|
Term
|
Definition
| A says I want to authenticate as A, B responds with random message R, A sends back a signed version (Sign(A,R)); eavsdropper reads message but cannot authenticae as A |
|
|