5 - RSA in more detail Flashcards

1
Q

To send m to Bob it is encrypted as

A

c= m^e mod n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TO decrypt, Bob uses…

A

c^d mod n to get m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RSA - example with p =3 and q =11

A

n = pq = 33
r = (p-1)(q-1) = 20
e = 3 (random, no common divisor with 20 other than 1)
d = 7 (mult inverse of 3 in Z20)

Pub key = (e,n) = (3,33)
Private = (d,p,q) = (7,3,11)

Eg m=5 is c=5^3 mod 33 = 26
then m = c^7 mod 33
so 26^7 mod 33 = 5W

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RSA -Why is it correct?

A

c^d mod n =
(m^e mod n)^d mod n =
m^(ed) mod n =
m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or false: (m^e mod n)^d mod n = m^(ed) mod n

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If you have a 1024bit integer to add to another, is this possible outright?

A

No, processors generally cannot handle all in one.

Add in blocks of 32bit etc and carry over

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How long do p and q need to be ( not in number of bits)

A

More than 150 decimal digits long.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Main method of RSA attacking

A

Integer Factorisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Integer factorisation using n to get the decryption exponent d from a public key

A

p and q are prime numbers. Work them out from n and you already know e from the public key.

Follow how the key was made then you get the decryption exponent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Integer factorisation: would finding r or d directly be quicker?

A

No, it has been shown that it is roughly as ahrd as factorisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is factorisation NP-hard or complete?

A

We do not know. It may be possible to do in polynomial time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to protect against RSA mathematical attacks?

A
  • Choose p and q sufficiently large
  • Currently recommended 1024bit key and 2048bit keys (where p and q are approximiately half the bits)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Side channel attacks

A

Attacks based on physical realisation of the implementation. Timing power, electromagnetic leaks etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Eve utilises a side channel attack…

A

she observes how long/much power it takes to decrypt a ciphertext. The time taken by the square-and-multiply algorithm increases with the number of 1s in the binary rep of d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Protection against timing attacks

A

Modify the exponentiation algorithm to take constant/random time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly