CoboCards App FAQ & Wünsche Feedback
Sprache: Deutsch Sprache
Kostenlos registrieren  Login

Hol' Dir diese Lernkarten, lerne & bestehe Prüfungen. Kostenlos! Auch auf iPhone/Android!

E-Mail eingeben: und Kartensatz kostenlos importieren.  
Und Los!
Alle Oberthemen / algosone / algosone

IT-Security TU Graz (64 Karten)

Sag Danke
1
Kartenlink
0
algosone
Verlässliche Datenanalysen sind für mich ein wichtiger Teil meiner Projekte geworden. Mit dem Service, den ich auf https://algosone.ai/de/ gefunden habe, konnte ich endlich einen Ansatz entdecken, der individuell auf meine Bedürfnisse zugeschnitten ist. Besonders die präzisen Algorithmen und die intuitive Plattformgestaltung machen die Arbeit effizienter. Für Unternehmen, die datenbasierte Entscheidungen optimieren wollen, ist das definitiv eine lohnenswerte Option.
Tags: algosone
Quelle: algosone
2
Kartenlink
0
What is the birthday paradox?
Antwort
Tags: Wireless Security
Quelle:
3
Kartenlink
0
How many people are necessary so that with probability > 50% two have their birthdays on the same day?
23
Tags: Wireless Security
Quelle:
4
Kartenlink
0
Why is WEP considered to be insecure?
Antwort
Tags: Wireless Security
Quelle:
5
Kartenlink
0
How can we attack WPA2?
Antwort
Tags: Wireless Security
Quelle:
6
Kartenlink
0
Why do we have to care about buffer overflows?
Antwort
Tags: Wireless Security
Quelle:
7
Kartenlink
0
Should we design cryptographic protocols ourselves?
No :)
Tags: Wireless Security
Quelle:
8
Kartenlink
0
If I am the owner of a root certificate, can I create a certificate for www.google.com?
Antwort
Tags: Key Establishment
Quelle:
9
Kartenlink
0
Die Bürgerkarte
Antwort
Tags: Key Establishment
Quelle:
10
Kartenlink
0
Rplay Attack
Antwort
Tags: Key Establishment
Quelle:
11
Kartenlink
0
Kerberos
Antwort
Tags: Key Establishment
Quelle:
12
Kartenlink
0
Woman-in-the-Middle Attack
Antwort
Tags: Key Establishment
Quelle:
13
Kartenlink
0
PGP and X.509
Antwort
Tags: Key Establishment
Quelle:
14
Kartenlink
0
X.509 is secure
Antwort
Tags: Key Establishment
Quelle:
15
Kartenlink
0
Revocation
Antwort
Tags: Key Establishment
Quelle:
16
Kartenlink
0
Did we solve the key distribution problem?
Antwort
Tags: Key Establishment
Quelle:
17
Kartenlink
0
Trust
Antwort
Tags: Key Establishment
Quelle:
18
Kartenlink
0
Check whether (x,y) is a valid point (E given).
Antwort
Tags: Finite Field and ECC
Quelle:
19
Kartenlink
0
Let E be given. Compute all valid points defined over F 7.
Antwort
Tags: Finite Field and ECC
Quelle:
20
Kartenlink
0
Perform a point addition/doubling. Formulas are given.
Antwort
Tags: Finite Field and ECC
Quelle:
21
Kartenlink
0
Perform a generic point multiplication.
Antwort
Tags: Finite Field and ECC
Quelle:
22
Kartenlink
0
Why do we need asymmetric cryptography?
Antwort
Tags: DH-KE & Elgamal
Quelle:
23
Kartenlink
0
What is one of the major goals of asymmetric cryptography?
Antwort
Tags: DH-KE & Elgamal
Quelle:
24
Kartenlink
0
What is the Discrete Logarithm Problem?
Antwort
Tags: DH-KE & Elgamal
Quelle:
25
Kartenlink
0
What is the Diffie-Hellman Problem?
Antwort
Tags: DH-KE & Elgamal
Quelle:
26
Kartenlink
0
What are the similarities of the Diffie-Hellman key exchange and the Elgamal encryption?
Antwort
Tags: DH-KE & Elgamal
Quelle:
27
Kartenlink
0
ElGamal: Why do two identical messages not lead to two identical ciphertexts?
Antwort
Tags: DH-KE & Elgamal
Quelle:
28
Kartenlink
0
Why is it important not to reuse ephemeral keys?
Antwort
Tags: DH-KE & Elgamal
Quelle:
29
Kartenlink
0
Why do we need to use a hash function in DSA?
Antwort
Tags: DH-KE & Elgamal
Quelle:
30
Kartenlink
0
What is Euler's Phi Function and Fermat's Little Theorem?
Antwort
Tags: RSA in practice
Quelle:
31
Kartenlink
0
Which (four) mathematics oriented attacks on RSA do you know?
Antwort
Tags: RSA in practice
Quelle:
32
Kartenlink
0
What are the problems of RSA regarding its "determinism"?
Antwort
Tags: RSA in practice
Quelle:
33
Kartenlink
0
What measures does RSA-OAEP use to secure textbook RSA?
Antwort
Tags: RSA in practice
Quelle:
34
Kartenlink
0
How can you improve the performance of RSA?
Antwort
Tags: RSA in practice
Quelle:
35
Kartenlink
0
[Physical Attacks] What cryptographic goals do you want to achieve?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
36
Kartenlink
0
What logical attacks did we discuss?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
37
Kartenlink
0
What applications need security?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
38
Kartenlink
0
What optimization principals do we want to achieve?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
39
Kartenlink
0
What is the problem with throughput?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
40
Kartenlink
0
What is the problem with power?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
41
Kartenlink
0
What is the problem with quality?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
42
Kartenlink
0
What is the problem with chip area?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
43
Kartenlink
0
Which criteria do we use to categorize physical attacks?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
44
Kartenlink
0
Is there perfect physical security?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
45
Kartenlink
0
What is a practical goal for such a security critical device?
Antwort
Tags: Introduction to Physical Attacks
Quelle:
46
Kartenlink
0
What are sources of leaking timing information?
Antwort
Tags: Passive Physical Attacks
Quelle:
47
Kartenlink
0
What are the two basic requirements to avoid the leakage of timing information?
Antwort
Tags: Passive Physical Attacks
Quelle:
48
Kartenlink
0
Which transformations are performed within the final round of AES?
Antwort
Tags: Passive Physical Attacks
Quelle:
49
Kartenlink
0
What is the difference between a simple power analysis (SPA) and a differential power analysis (DPA) attack?
Antwort
Tags: Passive Physical Attacks
Quelle:
50
Kartenlink
0
How does the DPA on AES work?
Antwort
Tags: Passive Physical Attacks
Quelle:
51
Kartenlink
0
Why is it important that the power traces are aligned?
Antwort
Tags: Passive Physical Attacks
Quelle:
52
Kartenlink
0
Name and explain three countermeasures against power analysis attacks.
Antwort
Tags: Passive Physical Attacks
Quelle:
53
Kartenlink
0
How is it possible to induce a fault?
Antwort
Tags: Active Physical Attacks
Quelle:
54
Kartenlink
0
Error detection codes.
Antwort
Tags: Active Physical Attacks
Quelle:
55
Kartenlink
0
How many bits can you recover by applying a safe-error attack, per induced fault?
Antwort
Tags: Active Physical Attacks
Quelle:
56
Kartenlink
0
How does the Bellcore attack work?
Antwort
Tags: Active Physical Attacks
Quelle:
57
Kartenlink
0
What are two countermeasures to secure RSA?
Antwort
Tags: Active Physical Attacks
Quelle:
58
Kartenlink
0
How does AES work?
Antwort
Tags: Active Physical Attacks
Quelle:
59
Kartenlink
0
How does a fault attack on AES work, when you toggle the LSB before the final round S-box operation?
Antwort
Tags: Active Physical Attacks
Quelle:
60
Kartenlink
0
How many plaintext / ciphertext pairs do you need to recover the full key?
Antwort
Tags: Active Physical Attacks
Quelle:
61
Kartenlink
0
How many plaintext / ciphertext pairs do you need when you insert an error at the end of the 7th round?
Antwort
Tags: Active Physical Attacks
Quelle:
62
Kartenlink
0
Explain how textbook RSA works. How do you generate keys, how do you encrypt a message, how do you decrypt a message? Explain this in full detail
Antwort
Tags:
Quelle: 20140414
63
Kartenlink
0
Name and explain two methods (in detail), with which the speed of the RSA exponentiation can be improved.
Antwort
Tags:
Quelle: 20140414
64
Kartenlink
0
Why is it a bad idea to share the RSA modulus n with other users? Discuss the scenario, when the attacker is IN the group of users who share the same modulus. Also, discuss the scenario, when the attacker is NOT a member of the group of users who share the same modulus.
Antwort
Tags:
Quelle: 20140414
Kartensatzinfo:
Autor: kirimayne
Oberthema: algosone
Thema: algosone
Veröffentlicht: 22.11.2024
 
Schlagwörter Karten:
Alle Karten (64)
Active Physical Attacks (9)
algosone (1)
DH-KE & Elgamal (8)
Finite Field and ECC (4)
Introduction to Physical Attacks (11)
Key Establishment (10)
Passive Physical Attacks (7)
RSA in practice (5)
Wireless Security (6)
Missbrauch melden

Abbrechen
E-Mail

Passwort

Login    

Passwort vergessen?
Deutsch  English