1/11
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Confidentiality
Ensure that information is only available to authorized user
Integrity
Ensure that information is altered in a reliable and appropriate manner
Availability
Ensure that information can be accesed by authorized users
Authenticity
Ensure that specified authorized users are who they say they are
Accountability
Ensure that users are responsible for their traces that they leave behind when using the internet
Passive Attacks
Eavedrops, obtain message, and analyze the network traffice: frequency, length, identity, location, etc
Active Attacks
Eavedrops and modify data stream or creation of false data stream
- Impersonation
- Replay
- Message Modification
- Denial of service
Unconditional Security
A cryptosystem that cannot be broken even with INFINITE computational resources
Provable Security
Reduce the security of the cryptosystem to some well-studied problems that is thoguth to be difficult
Computational Security
The computational effort required to break a cryptosystem
Best algo for breaking a system requires atleast N operations, where N is a very large number
No known practical cryptosystem can be proved to be secure under this definition
One-Time Pad
Unconditional Security because it uses a random key with the same length as the plain text with no repetitions but is not practical
Perfect Secrecy