8.7 Resources

Important Terms Introduced

  • assured pipeline

  • asymmetric cryptography

  • birthday attack

  • bit-flipping attack

  • bucket brigade attack

  • certificate chain

  • cryptonet

  • cryptoperiod

  • digital signature

  • elliptic curve cryptography

  • internal key

  • key encapsulation

  • key rollover

  • key splitting

  • key wrapping

  • keyed hash

  • man-in-the-middle attack

  • modular exponentiation

  • modular inverse

  • perfect forward secrecy

  • post-quantum cryptography

  • private key

  • public key

  • public-key certificate

  • public-key cryptography

  • quantum cryptanalysis

  • quantum cryptography

  • rekeying

  • reused key stream

  • root certificate authority

  • self-signed certificate

  • Separation of Duty

  • trusted third party

  • web of trust

Abbreviations Introduced

  • CA—certification authority

  • CEK—content encrypting key

  • D-H—Diffie–Hellman

  • DSS—Digital Signature Standard

  • HR—human resources

  • IKE—Internet Key Exchange

  • KEK—key encrypting key

  • PKCS—Public-Key Cryptography Standards

  • PKI—public-key infrastructure

  • PPTP—Point-to-Point Tunneling Protocol

  • RSA—Rivest–Shamir–Adleman

8.7.1 Review Questions

  1. R1.     Summarize the challenges of key management.

  2. R2.     If we need enough entropy for a 16-byte key, why should we hash a 20-byte (or larger) passphrase?

  3. R3.     Explain the reused key stream problem.

  4. R4.     Describe the role of the nonce in preventing reused key streams when using the same passphrase to encrypt different files.

  5. R5.     Describe how key wrapping may be applied to file encryption.

  6. R6.     What is the difference between key splitting and key wrapping?

  7. R7.     Summarize the reasons for rekeying an encrypted file.

  8. R8.     Describe the different categories of asymmetric encryption algorithms and how they are used in practice.

  9. R9.     What information must be shared to implement Diffie–Hellman key sharing? What is the result?

  10. R10.   What information must be shared to exchange a wrapped key using RSA?

  11. R11.   What information must be shared to validate a digital signature using RSA?

  12. R12.   What information must be available to validate a chain of certificates?

  13. R13.   Describe the differences between a hierarchical PKI and one that relies on a web of trust.

  14. R14.   Explain how one might establish trust in a self-signed certificate.

8.7.2 Exercises

  1. E1.     We want to calculate the amount of “secret entropy” in different implementations of file encryption—that is, the amount of truly secret, unpredictable information used to produce the ciphertext. We need a 16-byte secret key to encrypt the file. Use the estimate of three letters per character when estimating the entropy in text. (See Section 6.4.2.)

    1. Assume we encrypt the file with a 24-letter text passphrase truncated as shown in Figure 8.1.

    2. Assume we encrypt the file with a 24-letter text passphrase hashed as shown in Figure 8.2.

    3. Assume we encrypt the file with a 24-letter text passphrase hashed with a nonsecret nonce as shown in Figure 8.5.

  2. E2.     Redraw Figure 8.6 to show how to decrypt a ciphertext file that contains a wrapped key. Be sure to include all necessary components from the original diagram and omit any unnecessary components.

  3. E3.     Redraw Figure 8.6 to incorporate passphrases collected from two separate users. Combine the passphrases so that the encrypted file can be decrypted if either passphrase is provided. This allows someone who knows either passphrase to decrypt the file.

  4. E4.     Redraw Figure 8. 6 to incorporate passphrases collected from two separate users. Combine the passphrases to implement Separation of Duty. The encrypted file should be decrypted only if both passphrases are provided.

  5. E5.     Assume that we can perform 10 million trials per second on our desktop machine. How long will it take us to crack a 1024-bit Diffie–Hellman key? Use the information in Table 8.2.

  6. E6.     Bob plans to use Diffie–Hellman to construct a shared secret to encrypt a file shared with Alice. Eve wants to perform a bucket brigade attack and read the shared file.

    1. Draw a diagram similar to Figure 8.14, showing how Eve takes part as an invisible participant of the Diffie–Hellman exchange between Bob and Alice.

    2. Based on your answer to (a), draw a diagram showing how the contents of Bob’s file is shared with Alice.

  7. E7.     Bob’s little brother loves crypto, especially public-key technology, but he doesn’t understand how some of it works. He wrote his own encryption program, shown in FIGURE 8.33. Draw a diagram showing how Bob could decrypt this message. Omit unnecessary steps.

  8. E8.     Bob signed an IOU with a digital signature. The signature uses a 2048-bit RSA key and a 128-bit hash.

    1. How many trials should it take, on average, to crack the RSA key?

    2. How many trials should it take, on average, for a birthday attack to succeed against a 128-bit hash?

    3. Given the previous answers, which is weaker—the hash or the RSA key?

  9. E9.     PGP uses public keys to wrap the content key when encrypting a file. Bob wants to share a file with Tina and Alice. He has public keys from each of them. Draw a diagram showing how the file is encrypted and the keys wrapped so that either Tina or Alice may decrypt the file.

  10. E10.   Amalgamated Widget has entered a partnering agreement with Foonley Corporation. As a result, email encryption will interoperate between Amalgamated and Foonley. Instead of inserting a second root key into everyone’s email software, Amalgamated has published a certificate containing Foonley’s root key, signed by Amalgamated’s root. Draw a diagram showing how a certificate signed by Foonley’s root is thus validated using Amalgamated’s root key.

  11. E11.   Identify one or more DRM systems that you use yourself. Describe any problems that occurred using them.

  12. E12.   Locate a news report of a cyberattack that subverts public-key certificates. For example, this could be an attack on a certificate authority, or theft of a private key associated with a victim’s published public-key certificate (i.e., for a website). Write an attack case study about it.

An illustration depicts Little brother’s encryption program.

FIGURE 8.33 Little brother’s encryption program.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset