SaC 2 at TU Dresden

Flashcards and summaries for SaC 2 at the TU Dresden

Arrow Arrow

It’s completely free

studysmarter schule studium
d

4.5 /5

studysmarter schule studium
d

4.8 /5

studysmarter schule studium
d

4.5 /5

studysmarter schule studium
d

4.8 /5

Study with flashcards and summaries for the course SaC 2 at the TU Dresden

Exemplary flashcards for SaC 2 at the TU Dresden on StudySmarter:

Task 2: Anonymity/privacy related protection goals

Exemplary flashcards for SaC 2 at the TU Dresden on StudySmarter:

Task 1: Fünf Methoden um Anonymität zu erzielen

Exemplary flashcards for SaC 2 at the TU Dresden on StudySmarter:

Task 30: Why asymmetric crypto in Mixes?

This was only a preview of our StudySmarter flashcards.
Flascard Icon Flascard Icon

Millions of flashcards created by students

Flascard Icon Flascard Icon

Create your own flashcards as quick as possible

Flascard Icon Flascard Icon

Learning-Assistant with spaced repetition algorithm

Sign up for free!

Exemplary flashcards for SaC 2 at the TU Dresden on StudySmarter:

Task 29: How to achieve recipient anonymity?

Exemplary flashcards for SaC 2 at the TU Dresden on StudySmarter:

Task 3: Welches Protection Goal mit welcher Technik?

Exemplary flashcards for SaC 2 at the TU Dresden on StudySmarter:

Task 27: Why “discard repeats”?

Exemplary flashcards for SaC 2 at the TU Dresden on StudySmarter:

Task 26: How does a Mix network work? What are the basic functions of a Mix?

This was only a preview of our StudySmarter flashcards.
Flascard Icon Flascard Icon

Millions of flashcards created by students

Flascard Icon Flascard Icon

Create your own flashcards as quick as possible

Flascard Icon Flascard Icon

Learning-Assistant with spaced repetition algorithm

Sign up for free!

Exemplary flashcards for SaC 2 at the TU Dresden on StudySmarter:

Task 3: Which protection goal can be achieved with which anonymity technique?

Exemplary flashcards for SaC 2 at the TU Dresden on StudySmarter:

Task 4: How secure is the achieved anonymity in the case of broadcast with respect to observing / modifying attackers?

Exemplary flashcards for SaC 2 at the TU Dresden on StudySmarter:

Task 5: Will end-to-end encryption solve the problem of modifying attacks on broadcast?

Exemplary flashcards for SaC 2 at the TU Dresden on StudySmarter:

Task 28: Why indeterministic asymmetric cryptography in Mixes?

This was only a preview of our StudySmarter flashcards.
Flascard Icon Flascard Icon

Millions of flashcards created by students

Flascard Icon Flascard Icon

Create your own flashcards as quick as possible

Flascard Icon Flascard Icon

Learning-Assistant with spaced repetition algorithm

Sign up for free!

Exemplary flashcards for SaC 2 at the TU Dresden on StudySmarter:

Task 7: Why do we need “digital signal regeneration”?

Your peers in the course SaC 2 at the TU Dresden create and share summaries, flashcards, study plans and other learning materials with the intelligent StudySmarter learning app.

Get started now!

Flashcard Flashcard

Exemplary flashcards for SaC 2 at the TU Dresden on StudySmarter:

SaC 2

Task 2: Anonymity/privacy related protection goals

Confidentiality stärkt gegenseitig, Unobservability impliziert anonymität, Accountability schwächt anonymität ab, Integrity, Availability,


Sender-Anon, Empfänger-Anon, Delivery

SaC 2

Task 1: Fünf Methoden um Anonymität zu erzielen

Broadcast, PIR, RING, DC-Net, Mix

SaC 2

Task 30: Why asymmetric crypto in Mixes?

Bei symmetrischen Verfahren muss der Sender einen Schlüssel mit jedem Mix austauschen, dadurch erfährt der Mix, wer der Sender ist.

SaC 2

Task 29: How to achieve recipient anonymity?

Indirekte Re-Encryption,

Empfänger teilt dem Sender anonyme Rückadresse mit, in der Adressen der Mix stehen, und symmetrische Schlüssel(verschlüsselt mit PK des jeweiligen Mix), mit denen Mixe die Nachricht umcodieren sollen

- Header: Hi=ci(ki, Ai+1, Hi+1)

- Content: Ii=ki-1(Ii-1)

SaC 2

Task 3: Welches Protection Goal mit welcher Technik?

Confidentiality: E2E Encryption, techniken im Netzwerk zum Schutz von Netzwerkdaten und dem Mobilitätsverhalten

Integrität: Authentications Systeme, Signiertechniken: diversifizierte Netzwerke

SaC 2

Task 27: Why “discard repeats”?

gleiche Eingaben führen zu gleichen Ausgaben, Angreifer kann die gl. Nachricht in mehreren Batch einspielen und schauen, welche Ausgabe 2 mal Auftaucht -> das ist die Nachricht

SaC 2

Task 26: How does a Mix network work? What are the basic functions of a Mix?

- filtern: Wiederholungen rauswerfen

- in Batch speichern, bis genügend Nachricten da

- umcodieren

- umsortieren

SaC 2

Task 3: Which protection goal can be achieved with which anonymity technique?

Sender Anonymität: - DC Network, MIX, Ring

Empfänger-Anonymität: - Broadcast

PIR: Service weiß nicht, welche nachricht angefragt wird

Unlinkability of Sender and Recipient: MIX, DC-Net

SaC 2

Task 4: How secure is the achieved anonymity in the case of broadcast with respect to observing / modifying attackers?

- observing: bzgl. Recipient Anonymity Sicher, Angreifer lernt nicht den tatsächlicne Empfänger

- modifying: Angreifer kann 1. den Service unterbrechen, 2. durch inkonsistentes Senden den Empfänger einer Nachricht ermitteln

SaC 2

Task 5: Will end-to-end encryption solve the problem of modifying attacks on broadcast?

Nein, DoS immernoch möglich, Verschlüsselung ändert daran nichts, auch inskosistentes Senden immernoch möglich

SaC 2

Task 28: Why indeterministic asymmetric cryptography in Mixes?

Bei Determinismus wird jede Nachricht gleich kodiert, gleiche Nachrichten führten zu gleichen Ausgaben

SaC 2

Task 7: Why do we need “digital signal regeneration”?

- analoge Signale sind abhängig von der sendenden Station immer unterschiedlich im Erscheinungsbild, Station kann anhand dieser analogen Merkmale möglicherweise erkannt werden

- deshalb wird die Nachricht von  der Weiterleitenden Station gespeichert und von ihr selbst erneut gesendet, so dass das analoge Signal nicht von dem der eigenen Nachrichten zu unterscheiden ist

Sign up for free to see all flashcards and summaries for SaC 2 at the TU Dresden

Singup Image Singup Image

AC 2 at

Universität Freiburg im Breisgau

Safety 2 at

Hochschule Furtwangen

SOZ 2 at

Universität Koblenz-Landau

Sachenrecht 2 at

Universität Mannheim

SWE-2 at

Fachhochschule Kärnten

Similar courses from other universities

Check out courses similar to SaC 2 at other universities

Back to TU Dresden overview page

What is StudySmarter?

What is StudySmarter?

StudySmarter is an intelligent learning tool for students. With StudySmarter you can easily and efficiently create flashcards, summaries, mind maps, study plans and more. Create your own flashcards e.g. for SaC 2 at the TU Dresden or access thousands of learning materials created by your fellow students. Whether at your own university or at other universities. Hundreds of thousands of students use StudySmarter to efficiently prepare for their exams. Available on the Web, Android & iOS. It’s completely free.

Awards

Best EdTech Startup in Europe

Awards
Awards

EUROPEAN YOUTH AWARD IN SMART LEARNING

Awards
Awards

BEST EDTECH STARTUP IN GERMANY

Awards
Awards

Best EdTech Startup in Europe

Awards
Awards

EUROPEAN YOUTH AWARD IN SMART LEARNING

Awards
Awards

BEST EDTECH STARTUP IN GERMANY

Awards