3 - 3: Asymmetric Cryptography Flashcards
Asymmetric cryptography
Each user has a pair of keys: one public, one private. Key pairs are created by picking two large prime numbers
RSA
Ron Rivest, Adi Shamir, and Len Adelmen, who created the RSA asymmetric key system in use since 1977.
RSA key use
1) Sender encrypts with recipient’s public key 2) Recipient decrypts with their own private key
RSA key facts
Asymmetric encryption algorithm, slow for long messages, good for initial exchanges leading to symmetric key communication, keeps authentication as long as private key is private, variable key length between 1,024 and 4,096 bits, still considered secure w/in that range
PGP
Pretty good privacy, open source algorithm, uses both asymmetric and symmetric cryptography,
Sending with PGP
1) Sender generates random key for original plaintext, 2) encrypts with random key, 3) then encrypts random key with recipient’s public key
Receiving with PGP
1) Recipient decrypts with their private key which produces the random key, 2) use the decrypted random key to decrypt the message
Elliptic curve cryptography
Cryptography which does not rely on prime factorization
Quantum Computing
Computing, and therefore cryptography, that uses quantum computing capability
Tor Protocol
The Onion Router, which uses nodes and relay networks to encrypt traffic, facilitates 1) private and anonymous internet access and 2) access to the dark web
Perfect Forward Secrecy
TOR’s mechanic where communications are encrypted to allow only the nodes immediately before and after it access to the message