CSEC 701 SSL Cryptographic Computation

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/77

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:08 AM on 11/30/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

78 Terms

1
New cards

IPsec headers

contain info on the VPN link and the packet, network layer protocol header on top of another network layer protocol (IP), AH & ESP

2
New cards

IPsec modes

method of transportation of user data, transport & tunnel mode

3
New cards

IPsec IKE

internet key exchange, mutual authentication, establish shared symmetric key, two phases

4
New cards

authentication header

IPsec header, data integrity, origin authentication, anti-replay, NO encryption

5
New cards

encapsulated security payload

IPsec header, confidentiality, integrity, optional authentications, HAS encryption

6
New cards

transport mode

between two hosts: one IP header, then TCP/UDP header

7
New cards

tunnel mode

applied to an IP tunnel, outer IP header: IPsec processing destination; inner IP header: ultimate packet destination 

8
New cards

IKE

ISAKAMP+Oakley; protocol that produces security keys and other protocols, mutual authentication+session key establishment(long-term key), key management framework and key exchange protocol (DH)

9
New cards

ISAKAMP

establishes cryptographic keys and security associates

10
New cards

Oakley

a key agreement protocol, uses DH algorithm to create master key, and a key that is specific to each session

11
New cards

IKE phase 1

secure, authenticated session is established, mutual authentication, creates session keys for encrypting IKE phase 2 messages (expesnive)

12
New cards

IKE phase 2

the security services and details for an SA are negotiated, can occur multiple times, establishes IPsec SA (simple)

13
New cards

SSL architecture

SSL handshake protocol, SSL change cipher spec protocol, SSL alert protocl, applications; SSL record protocol

14
New cards

SSL handshake phase 1

Negotiation of the session ID, key exchange algorithm, MAC algorithm, encryption algorithm, and exchange of initial random numbers

15
New cards

SSL handshake phase 2

Server may send its certificate and key
exchange message, and it may request the client
to send a certificate. Server signals end of hello
phase.

16
New cards

SSL handshake phase 3

Client sends certificate if requested and may
send an explicit certificate verification message.
Client always sends its key exchange message.

17
New cards

SSL handshake phase 4

Change cipher spec and finish handshake

18
New cards

phase 1 client hello message

client version, client random, session id(zero or old id), cipher suites (list of cryptographic options)

19
New cards

phase 1 server hello message

server version, server random, session id(chosen by server) , cipher suite(single selected)

20
New cards

cipher suite

key exchange algorithm + cipherSpec

21
New cards

key exchange method

RSA, fixed DH, ephemeral DH, anonymous DH, fortezza

22
New cards

cipherspec

CiberAlgorithm, MACalgorithm, CipherType, IsExportable, HashSize, Key Material, & IV Size

23
New cards

session

defines a set of cryptographic security parameters which can be shared among multiple connections

24
New cards

connection

one mouse click, every connection is associated with one session, connections of the same session share the session state

25
New cards

SSL key derivation steps

  1. premaster secret

  2. master secret

  3. key material

  4. encryption keys

26
New cards

premaster secret

created by client, used to seed calculation of encryption parameters, 2 bytes SSL + 46 random bytes, sent encrypted to server using servers public key; at phase 3 after client key exchange

27
New cards

master secret

generated by both parties from premaster secret and random values generated by both client and server, one-time 48 byte value generated for session; MD5 ( PreMasterSecret || SHA(“A” || PreMasterSecret || CleintHello.random || ServerHello.random)) ||

28
New cards

key material

generated from the master secret and shared random values, changed for each connection; MD%( MasterSecret || SHA(“A” || MasterSecret || CleintHello.random || ServerHello.random)) ||

29
New cards

encryption keys

extracted from the key material

30
New cards

cryptographic parameters

the key material is divided into six 128-bit keys

31
New cards

in SSL, 48-byte pre-master secret is directly used to derive the key material?

False

32
New cards

in SSL, the key material is changed for different connections under one session?

True

33
New cards

in SSL, digital certificate is exchanged on every click?

False?

34
New cards

consequences of multiple domain names

responds with server hello and digital certificate, but which certificate? interferes with load balancing and sends error message 

35
New cards

unique IP for each domain name

waste of IP addresses

36
New cards

multi-domain certificates

impractical to use in a shared hosting

37
New cards

SNI

server name indication, extension to TLS by which a client indicates which hostname it is attempting to connect to at the start of the handshaking process

38
New cards

SNI privacy issues

NOT encrypted, so eavesdropper can see which site is being requested, exploited by security software, easier than IP address based filtering

39
New cards

ECH

encrypted client hello, enables encryption of the whole client hello message which is sent during the early stage of TLS negotiation, encrypts the payload with a public key,

40
New cards

encrypted SNI

encrypts the SNI rather than the whole hello client, a public key is attached to the DNS record, being phased out

41
New cards

ECH & ESNI adoption

only compatible with TLS 1.3, low adoption rates

42
New cards

TLS 1.2 problem

leakage of the pre-master or master secret, allowing an attacker to create key blocks for all connections in past and future

43
New cards

perfect forward secrecy

assurance that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised, it protects past session against future compromises, not offered by TLS 1.2, generates unique session key for every session

44
New cards

ephemeral key

different key is used for each connection, offered by DHE & ECDHE

45
New cards

DH

  1. agree on prime and generator

  2. generate a private key

  3. generate a public key

  4. exchange public key

  5. calculate shared secret key

none can do authentication so must be paired with other algorithm

46
New cards

X.509 digital certificate 

public key is contained in the certificate, (RSA or DH), CA signs the certificate with RSA

47
New cards

TLS 1.2 uses RSA

to encrypt the initial communication with servers public key, & authenticate the sender with CA’s public key

48
New cards

cipher suite algorithms

key exchange algorithms, authentication/digital signature algorithms, bulk encryption algorithms, message authentication code algorithms

49
New cards

key exchnage in TLS 1.3

uses RSA only for authentication, uses DHE key exchange protocol

50
New cards

TLS 1.2

defined in 2008, TLS extension defined, AES cipher suites added, supports 37 cipher suites

51
New cards

TLS 1.3

in 2018, removed support for older encryption standards, removed support for weaker and lesser used elliptical curves, removed compression, supports inly 5 cipher suites

52
New cards

TLS 1.3 improvements

simplified handshake by removing RSA, relying only on DH

53
New cards

limitations of HTTP/2

recovery from packet loss stalls all object transmissions

54
New cards

HTTP/3

quick UDP internet connections QUIC, replaces TLS and TCP, implements reliable transport in application library

55
New cards

QUIC initial connection

client connects a server over TCP port 443 and does TLS handshaking, can be done in TLS 1.2 or below, server responds to the clients HTTP request

56
New cards

QUIC discovery

in the server HTTP respons eheaders, it includes an Alt-Svc header

57
New cards

QUIC subsequent connections

the client caches this information, simultaneously attempts to connect using QUIC over UDP port 443, maintains a fallback to the traditional TCP/TLS connection

58
New cards

security processing in QUIC

very first TCP?TLS connection is only for discovery, when the session is established the entire X.509 exchange/verification occurs again over QUIC

59
New cards

QUIC

TLS 1.3 is mandatory, HTTP/3 cannot work without QUIC, it replaces TCP with UDP while providing built-in encryption

60
New cards

SSLstrip

man in the middle attack, works on both SSL and TLS by transparently converting the secure HTTPS connection into a plain HTTP connection, removing the transport layer encryption protections

61
New cards

HTTP strict transport security

an IETF standard and a mechanism to enforce rules to prevent browsers from downgrading security; created in response to a series of attack profiles

62
New cards

rlogin

TCP port 513, only to unix host, info is unencrypted, BSD package incldues rcp and rsh

63
New cards

telnet

TCP port 23, can make interactive raw TCP sessions, no encryption or authentication, telnet daemons

64
New cards

risks of remote access protocols 

data travels in cleartext format, intermediate hosts can hijack sessions, authentication based on IP address and reusable passwords

65
New cards

secure shell SSH

replaces rlogin, telnet, and rsh, secure encrypted communication between two untrusted hosts over an insecure network, provides security at application layer (port 22)

66
New cards

SSH-2 architecture

applications, SSH user authentication protocol and connection protocol, SSH transport layer protocol, TCP

67
New cards

SSH transport layer protocol tasks

sets up secure channel between client and server; server authentication, encryption, integrity verification, and compression

68
New cards

SSH transport layer protocol steps

  1. TCP connection setup

  2. SSH version string exchange

  3. exchange lists of supported algorithms

  4. initial key exchange

  5. server authentication (fingerprint & certficate)

69
New cards

SSH key exchange

gives a shared secret key K and a hash H

70
New cards

best effort

accept host key without check when connecting the first time to the server, save the host key in the local database, and check against the saved key on all future connections ot same server

71
New cards

higher level protocol services on top of SSH transport

SSH user authentication protocol, SSH connection protocol, filr etransfer

72
New cards

SSH user authentication protocol

authenticates the client-side user to the server, relies on data privacy and integrity provided by transport layer, CLIENT driven

73
New cards

SSH connection protocol

multiplexes the encrypted tunnel into several logical channels

74
New cards

protections by SSH

interceptions of cleartext passwords by intermediate hosts, manipulation of data by people in control of intermediate hosst (MITM), IP spoofing, IP source routing, DNS spoofing

75
New cards

SFTP

SSH secure file transfer protocol, driven by commands similar to FTP, provides general file system access

76
New cards

SCP

replaces RCP but data is encrypted, only file transfer no authentication, generally faster than SFTP

77
New cards

SSH is a replacement for what

78
New cards

in SSH, if the host key is not pre-populated at the client, can a connection be made with the server