🔤 Terminology

Types of Attacks

Attacker Model describes the capacities of a potential attacker, don’t build systems that are overly secure for the types of attacks they typically get.

Principals are the processes that carry out actions in a security example (Alice, Bob)

Policies vs. Mechanisms


🔺CIA Triad

These qualities need to be accomplished by a secure system

Confidentiality

Integrity

Availability


🔏 Encryption & Decryption

gives you an encoded message or cipher text


Types of Keys

Key = sequence of bytes assigned to a user, can be used to lock or unlock

👯 Symmetric Key

Since public-private key is expensive, systems typically use it only to start session + generate a shared key → then the shared key is used for following message exchanges

🔑 Public-Private Key


👤 Authentication

Direct Authentication → only involves two parties

How can Alice prove to Bob that she is Alice without giving away Kab (because people can eavesdrop and steal Kab) ?

  1. Alice tells Bob she’s Alice
  2. Bob sends Alice nonce_b
  3. Alice sends back an encrypted nonce Kab(nonce_b) and Bob can compare and confirm since they both share Kab
  4. Alice now sends her own nonce nonce_a
  5. This time, Bob confirms by sending Kab(nonce_a)

OPTIMIZATION 🔥

IMG_176BB48E8822-1.jpeg

image.png