[Wireless Security] Cryptographic Goals
CIA:
and
- Confidentiality
- Integrety
- Authentication
and
- non-repudiation
Tags: Wireless Security
Source:
Source:
How many people are necessary so that with probability > 50% two have their birthdays on the same day?
23
Tags: Wireless Security
Source:
Source:
Tags: Wireless Security
Source:
Source:
If I am the owner of a root certificate, can I create a certificate for www.google.com?
Antwort
Tags: Key Establishment
Source:
Source:
Tags: Finite Field and ECC
Source:
Source:
Tags: Finite Field and ECC
Source:
Source:
Tags: Finite Field and ECC
Source:
Source:
Tags: DH-KE & Elgamal
Source:
Source:
What are the similarities of the Diffie-Hellman key exchange and the Elgamal encryption?
Antwort
Tags: DH-KE & Elgamal
Source:
Source:
Tags: DH-KE & Elgamal
Source:
Source:
Tags: RSA in practice
Source:
Source:
Tags: RSA in practice
Source:
Source:
Tags: RSA in practice
Source:
Source:
Tags: RSA in practice
Source:
Source:
Tags: Introduction to Physical Attacks
Source:
Source:
Tags: Introduction to Physical Attacks
Source:
Source:
Tags: Introduction to Physical Attacks
Source:
Source:
Tags: Introduction to Physical Attacks
Source:
Source:
Tags: Introduction to Physical Attacks
Source:
Source:
Tags: Introduction to Physical Attacks
Source:
Source:
Tags: Introduction to Physical Attacks
Source:
Source:
Tags: Introduction to Physical Attacks
Source:
Source:
Tags: Introduction to Physical Attacks
Source:
Source:
Tags: Passive Physical Attacks
Source:
Source:
What are the two basic requirements to avoid the leakage of timing information?
Antwort
Tags: Passive Physical Attacks
Source:
Source:
Tags: Passive Physical Attacks
Source:
Source:
What is the difference between a simple power analysis (SPA) and a differential power analysis (DPA) attack?
Antwort
Tags: Passive Physical Attacks
Source:
Source:
Tags: Passive Physical Attacks
Source:
Source:
Tags: Passive Physical Attacks
Source:
Source:
How many bits can you recover by applying a safe-error attack, per induced fault?
Antwort
Tags: Active Physical Attacks
Source:
Source:
Tags: Active Physical Attacks
Source:
Source:
How does a fault attack on AES work, when you toggle the LSB before the final round S-box operation?
Antwort
Tags: Active Physical Attacks
Source:
Source:
Tags: Active Physical Attacks
Source:
Source:
How many plaintext / ciphertext pairs do you need when you insert an error at the end of the 7th round?
Antwort
Tags: Active Physical Attacks
Source:
Source:
Explain how textbook RSA works. How do you generate keys, how do you encrypt a message, how do you decrypt a message? Explain this in full detail
Antwort
Tags:
Source: 20140414
Source: 20140414
Name and explain two methods (in detail), with which the speed of the RSA exponentiation can be improved.
Antwort
Tags:
Source: 20140414
Source: 20140414
Why is it a bad idea to share the RSA modulus n with other users? Discuss the scenario, when the attacker is IN the group of users who share the same modulus. Also, discuss the scenario, when the attacker is NOT a member of the group of users who share the same modulus.
Antwort
Tags:
Source: 20140414
Source: 20140414
Flashcard set info:
Author: Mihael
Main topic: Infomatik
Topic: IT Sicherheit
School / Univ.: TU Graz
City: Graz
Published: 21.07.2014
Tags: 2014