3 - Crypto Public Key Attacks Flashcards

1
Q

What is the key distribution problem and its solution?

A

Need to share keys

Asymmetric cryptography is the solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Asymmetric (Public Key)?

A

Uses a different key for encryption and decryption

Depends on hard maths problems

Generate key pairs, one key is private another is public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some properties of asymmetric/public keys?

A

Doesn’t matter if connection is insecure

Can prove someone encrypted something

Can combine encryption using different keys to ensure only recipient can decrypt, and prove author identity, can also prove no alterations were made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How should keys be generated?

A

Using one way functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a one way function?

A

Function to generate keys and is computationally infeasible to get private key from public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is modular arithmetic?

A

Clocks work mod 12
E.g. 14 = 2 mod 12
a ≡ b mod n if a % n = b % n
14 % 12 = 2, 2 % 12 = 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is prime factorisation?

A

6 * 11 = 77

391

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is RSA Key Generation?

A

Pick 2 large distinct random primes (p and q)

Calculate n = pq

Calculate φ(n) = (p-1)(q-1)

Pick e = number less than φ, co-prime to φ

Calculate d
- d*e mod φ(n) = 1

Public key is (e, n)
Private key is (d, n)
Computationally infeasible to compute d from e and n alone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Factorising large numbers

A

Difficult to find the 2 numbers that make up a very large number (get better definition)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RSA Encryption

A

Split message into blocks
e.g 070515807052 7080119270718

for each plaintext block B
bᵉ(mod n)
e.g. 1658228449402 5333403068473

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RSA Decryption

A

For each ciphertext block C

Cᵈ(mod n)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are important features of RSA?

A

Public key crypto

  • public key is published
  • private key isn’t

Relies on one way functions
- Modular arithmetic, prime factorisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Diffie-Hellman key exchange?

A

Establish a shared secret (key) between two parties

Not sharing info, but creating a key together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are methods for attacking a substitution cipher?

A

Known letter frequencies, common words and digraphs and trigraphs (th, er, the, ion etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Does frequency analysis work on transposition ciphers?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Classifying attacks

A

Brute force

Cipher text only

Known or chosen
- plaintext or ciphertext

17
Q

What are some applications of cryptography?

A

SSL

Encrypted email, hard disks, files, devices…

Cryptocurrencies

18
Q

What is a hash function?

A

Takes arbitrary length input and generates fixed length output

Same input always produces same hash

19
Q

Secure hash functions

A

One way
- computationally infeasible to find message from its hash

Strong collision resistance
- computationally infeasible to find two different messages that hash to same hash value

20
Q

What is MD-5?

A

128 bit hash function

Shown in 2004 to not be collision resistant

21
Q

What is SHA?

A

Another hash function

SHA-1 produces 160 bit hash code

SHA-512 produces 512 bit hash code

22
Q

Digital signatures

A

Sender combines message with their private key and sends this with signature to recipient who uses sender’s public key to decrypt message

(check this)