3 - 3: Asymmetric Cryptography Flashcards

1
Q

Asymmetric cryptography

A

Each user has a pair of keys: one public, one private. Key pairs are created by picking two large prime numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RSA

A

Ron Rivest, Adi Shamir, and Len Adelmen, who created the RSA asymmetric key system in use since 1977.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RSA key use

A

1) Sender encrypts with recipient’s public key 2) Recipient decrypts with their own private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RSA key facts

A

Asymmetric encryption algorithm, slow for long messages, good for initial exchanges leading to symmetric key communication, keeps authentication as long as private key is private, variable key length between 1,024 and 4,096 bits, still considered secure w/in that range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PGP

A

Pretty good privacy, open source algorithm, uses both asymmetric and symmetric cryptography,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sending with PGP

A

1) Sender generates random key for original plaintext, 2) encrypts with random key, 3) then encrypts random key with recipient’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Receiving with PGP

A

1) Recipient decrypts with their private key which produces the random key, 2) use the decrypted random key to decrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Elliptic curve cryptography

A

Cryptography which does not rely on prime factorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Quantum Computing

A

Computing, and therefore cryptography, that uses quantum computing capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tor Protocol

A

The Onion Router, which uses nodes and relay networks to encrypt traffic, facilitates 1) private and anonymous internet access and 2) access to the dark web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Perfect Forward Secrecy

A

TOR’s mechanic where communications are encrypted to allow only the nodes immediately before and after it access to the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly