Quiz 6 securing IoT (AI)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/36

flashcard set

Earn XP

Description and Tags

Ai generated notes for lectures 13 and 14.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards

Purpose of a digital signature

To prove message authenticity and integrity using the sender's private key.

2
New cards

Key used to verify a digital signature

The sender's public key.

3
New cards

Non-repudiation in digital signatures

The sender cannot deny sending the signed message.

4
New cards

Is signing the same as encryption?

No, they are different operations, though both use keys.

5
New cards

What is usually signed instead of the full message?

The hash of the message.

6
New cards

Why is the hash of a message signed instead of the message itself?

It is more efficient and ensures integrity via the hash.

7
New cards

What happens if an adversary tampers with the message or signature?

The verification process will fail.

8
New cards

Why can't HMACs provide non-repudiation?

Because both sender and receiver share the same secret key.

9
New cards

Main difference between symmetric and asymmetric encryption

Symmetric uses the same key for encryption and decryption; asymmetric uses a public/private key pair.

10
New cards

Why are both symmetric and asymmetric keys often used together?

To combine efficiency (symmetric) with secure key exchange (asymmetric).

11
New cards

Purpose of key establishment

To securely generate and share a secret key between communicating parties.

12
New cards

Role of a Trusted Third Party (TTP) in key establishment

It helps generate and distribute a shared session key securely.

13
New cards

Purpose of the nonce (Na) in key establishment

To ensure freshness and prevent replay attacks.

14
New cards

Who can decrypt {Kab, A}_Kb in the TTP protocol?

Only Bob, using his private key Kb.

15
New cards

How does Bob verify that Alice knows Kab?

Bob sends a challenge {Nb}_Kab and expects Alice to return {Nb-1}_Kab.

16
New cards

What information can an eavesdropper learn in the TTP exchange?

Only message 1 (A, B, Na); all others are encrypted.

17
New cards

What is exchanged in RSA-based key establishment?

Nonces encrypted with each other's public keys.

18
New cards

How is the shared key derived in RSA key exchange?

Using a hash of the XOR of both nonces.

19
New cards

Why can't an intercepted nonce be used as a key directly?

It must remain confidential and be combined securely.

20
New cards

What do Alice and Bob each choose in Diffie-Hellman?

Private keys (a, b) and compute public keys (ga, gb).

21
New cards

How is the shared key computed in Diffie-Hellman?

Alice: (gb)^a, Bob: (ga)^b.

22
New cards

What vulnerability does Diffie-Hellman share with RSA if keys are not verified?

Man-in-the-middle (MITM) attack.

23
New cards

What does a certificate do?

Binds an entity's identity to its public key.

24
New cards

Who issues certificates?

A trusted Certificate Authority (CA).

25
New cards

How does a CA ensure authenticity of certificates?

By signing them with its private key.

26
New cards

What must be verified before accepting a certificate?

The CA's signature, validity period, and matching identity.

27
New cards

How do hash functions help protect certificates?

They detect tampering with certificate contents.

28
New cards

What happens if a CA is compromised?

Fake certificates can be issued, undermining trust.

29
New cards

Are certificates foolproof security mechanisms?

No, they still require proper validation and trust management.

30
New cards

What is Bluetooth designed for?

Short-range, low-power wireless communication between devices.

31
New cards

Structure of a Bluetooth network

One master device with multiple slave devices.

32
New cards

Four main steps of early Bluetooth pairing

Create initialization key (Kinit), create link key (Kab), authenticate, create encryption key.

33
New cards

How was the initialization key (Kinit) generated in early Bluetooth?

Using the Bluetooth device address (BD_Addr), PIN, and random number (IN_Rand).

34
New cards

What happens if an adversary learns Kinit?

They can compute Kab and break the pairing security.

35
New cards

How could an attacker crack early Bluetooth pairing?

By guessing the PIN, computing Kinit', and testing possible Kab values.

36
New cards

Why is legacy Bluetooth pairing no longer used?

It is insecure due to weak PIN-based keys.

37
New cards

What system replaced legacy pairing in Bluetooth?

Secure Simple Pairing (used in Bluetooth Low Energy).