Criptografía y Seguridad de Redes
Classified in Computers
Written at on English with a size of 2.89 KB.
Double DES
Use 2 keys to encrypt. Meet in the middle attack. Find E(M1) = D(C1).
ECB
Each block is encoded with the same key, information leakage can occur with repeated messages, parallelizable. Block replay attack – While monitoring. (Find and play repeated messages)
CBC
Used with a key – but not secret. Plaintext can produce different ciphers based on IV -> limits info leaks. Patterns still emerge for long messages. The problem – no integrity.
Diffie Hellman
- Choose two large primes: p and g.
- Choose a and b from [1, p-2].
- Calculate A/B = g^[a/b] mod p.
- Calculate s = B/A^[a/b] mod p.
- k = SHA256(s)
- Use k as the key for CBC.
Vulnerable to Man-in-the-Middle attack: Change A and B to p.
RSA
- Generate 2 large distinct primes p and q.
- n = pq, phi = (p-1)(q-1).
- Select random integer e < phi and relatively prime to phi.
- Calculate d < phi s.t. e*d mod phi == 1.
- Public key: [e, n], private key: [d, n].
SSL
Avoid network attacks (eavesdropper). Provide confidentiality + integrity, does not browser based attack.
TLS
Why don’t we always use HTTPS
Slows down web server, breaks internet caching. But always use SSL for hosting websites.
OSI
- Physical: controls bits on the medium, [Physical destruction]
- Data Link: controls interface to physical medium within frames, [MAC flooding -- inundates the network switch with data packets]
- Network: controls routing of packets, [ICMP Flooding - A Layer 3 infrastructure DDoS attack method that uses ICMP messages to overload the targeted network's bandwidth]
- Transport: controls error correction and packetization (breaking data into packets), [SYN Flood, Smurf Attack]
- Session
- Presentation
- Application: user centric protocols that send data, [PDF GET requests, HTTP GET, HTTP POST, = website forms (login, uploading photo/video, submitting feedback)].
- Practice defense in-depth tactics, use access controls, accountability, and auditing to track and control physical assets.
- Allow discovered MAC addresses to be authenticated against an authentication, authorization and accounting (AAA) server and subsequently filtered.
- Rate-limit ICMP traffic and prevent the attack from impacting bandwidth and firewall performance.
- DDoS attack blocking, commonly referred to as blackholing, is a method typically used by ISPs to stop a DDoS attack on one of its customers.
- Application monitoring is the practice of monitoring software applications using a dedicated set of algorithms, technologies, and approaches to detect zero day and application layer.