[Wireless Security] Cryptographic Goals
CIA:
and
- Confidentiality
- Integrety
- Authentication
and
- non-repudiation
Tags: Wireless Security
Quelle:
Quelle:
Tags: Wireless Security
Quelle:
Quelle:
How many people are necessary so that with probability > 50% two have their birthdays on the same day?
23
Tags: Wireless Security
Quelle:
Quelle:
Tags: Wireless Security
Quelle:
Quelle:
Tags: Wireless Security
Quelle:
Quelle:
Tags: Wireless Security
Quelle:
Quelle:
Tags: Wireless Security
Quelle:
Quelle:
If I am the owner of a root certificate, can I create a certificate for www.google.com?
Antwort
Tags: Key Establishment
Quelle:
Quelle:
Tags: Key Establishment
Quelle:
Quelle:
Tags: Key Establishment
Quelle:
Quelle:
Tags: Key Establishment
Quelle:
Quelle:
Tags: Key Establishment
Quelle:
Quelle:
Tags: Key Establishment
Quelle:
Quelle:
Tags: Key Establishment
Quelle:
Quelle:
Tags: Key Establishment
Quelle:
Quelle:
Tags: Key Establishment
Quelle:
Quelle:
Tags: Key Establishment
Quelle:
Quelle:
Tags: Finite Field and ECC
Quelle:
Quelle:
Tags: Finite Field and ECC
Quelle:
Quelle:
Tags: Finite Field and ECC
Quelle:
Quelle:
Tags: Finite Field and ECC
Quelle:
Quelle:
Tags: DH-KE & Elgamal
Quelle:
Quelle:
Tags: DH-KE & Elgamal
Quelle:
Quelle:
Tags: DH-KE & Elgamal
Quelle:
Quelle:
Tags: DH-KE & Elgamal
Quelle:
Quelle:
What are the similarities of the Diffie-Hellman key exchange and the Elgamal encryption?
Antwort
Tags: DH-KE & Elgamal
Quelle:
Quelle:
ElGamal: Why do two identical messages not lead to two identical ciphertexts?
Antwort
Tags: DH-KE & Elgamal
Quelle:
Quelle:
Tags: DH-KE & Elgamal
Quelle:
Quelle:
Tags: DH-KE & Elgamal
Quelle:
Quelle:
Tags: RSA in practice
Quelle:
Quelle:
Tags: RSA in practice
Quelle:
Quelle:
Tags: RSA in practice
Quelle:
Quelle:
Tags: RSA in practice
Quelle:
Quelle:
Tags: RSA in practice
Quelle:
Quelle:
Tags: Introduction to Physical Attacks
Quelle:
Quelle:
Tags: Introduction to Physical Attacks
Quelle:
Quelle:
Tags: Introduction to Physical Attacks
Quelle:
Quelle:
Tags: Introduction to Physical Attacks
Quelle:
Quelle:
Tags: Introduction to Physical Attacks
Quelle:
Quelle:
Tags: Introduction to Physical Attacks
Quelle:
Quelle:
Tags: Introduction to Physical Attacks
Quelle:
Quelle:
Tags: Introduction to Physical Attacks
Quelle:
Quelle:
Tags: Introduction to Physical Attacks
Quelle:
Quelle:
Tags: Introduction to Physical Attacks
Quelle:
Quelle:
Tags: Introduction to Physical Attacks
Quelle:
Quelle:
Tags: Passive Physical Attacks
Quelle:
Quelle:
What are the two basic requirements to avoid the leakage of timing information?
Antwort
Tags: Passive Physical Attacks
Quelle:
Quelle:
Tags: Passive Physical Attacks
Quelle:
Quelle:
What is the difference between a simple power analysis (SPA) and a differential power analysis (DPA) attack?
Antwort
Tags: Passive Physical Attacks
Quelle:
Quelle:
Tags: Passive Physical Attacks
Quelle:
Quelle:
Tags: Passive Physical Attacks
Quelle:
Quelle:
Tags: Passive Physical Attacks
Quelle:
Quelle:
Tags: Active Physical Attacks
Quelle:
Quelle:
Tags: Active Physical Attacks
Quelle:
Quelle:
How many bits can you recover by applying a safe-error attack, per induced fault?
Antwort
Tags: Active Physical Attacks
Quelle:
Quelle:
Tags: Active Physical Attacks
Quelle:
Quelle:
Tags: Active Physical Attacks
Quelle:
Quelle:
Tags: Active Physical Attacks
Quelle:
Quelle:
How does a fault attack on AES work, when you toggle the LSB before the final round S-box operation?
Antwort
Tags: Active Physical Attacks
Quelle:
Quelle:
Tags: Active Physical Attacks
Quelle:
Quelle:
How many plaintext / ciphertext pairs do you need when you insert an error at the end of the 7th round?
Antwort
Tags: Active Physical Attacks
Quelle:
Quelle:
Explain how textbook RSA works. How do you generate keys, how do you encrypt a message, how do you decrypt a message? Explain this in full detail
Antwort
Tags:
Quelle: 20140414
Quelle: 20140414
Name and explain two methods (in detail), with which the speed of the RSA exponentiation can be improved.
Antwort
Tags:
Quelle: 20140414
Quelle: 20140414
Why is it a bad idea to share the RSA modulus n with other users? Discuss the scenario, when the attacker is IN the group of users who share the same modulus. Also, discuss the scenario, when the attacker is NOT a member of the group of users who share the same modulus.
Antwort
Tags:
Quelle: 20140414
Quelle: 20140414
Kartensatzinfo:
Autor: Mihael
Oberthema: Infomatik
Thema: IT Sicherheit
Schule / Uni: TU Graz
Ort: Graz
Veröffentlicht: 21.07.2014
Tags: 2014
Schlagwörter Karten:
Alle Karten (64)
DH-KE & Elgamal (8)
Key Establishment (10)
RSA in practice (5)