3.4: Cryptosystems Flashcards
On what is a private key cryptosystem based?
On a symmetric cryptographic algorithm.
The primary characteristic of a private key cryptosystem
The necessity for both parties to possess a common encryption key that is used to encrypt and decrypt messages.
The main challenge with the private key cryptographic
- Key exchange - which must occur over a secure channel. The exchange o the encrypted key mush happens before the message is transmitted
- Scalability - Private key cryptosystems require that each sender-receiver pair exchange an encryption key.
Secure key exchange
Secure key exchange refers to methods used by two parties to securely establish a symmetric encryption key without actually transmitting the key over a channel.
On what is a public key cryptosystem based?
Public key cryptosystems are based on asymmetric, or public key, cryptographic algorithms.
The encryption keys used in public key cryptography
The encryption keys that are used in public key cryptography are called the public key and the private key; called key pair.
symmetric encryption keys vs asymmetric encryption keys
• For symmetric - User must first establish and communicate symmetric encryption keys through a secure channel. After that, the same key is used for encryption and decryption
- For asymmetric encryption - No need to establish a secure channel to exchange key. Encryption uses one key, and decryption uses another key.
- Public key cryptography also supports encryption of a message with more than one user’s public key.
Handling of keys in asymmetric encryption keys
A public key can be shared or posted online
A private key is not shared. It should be kept secret.
What can Public key cryptography achieve
- To protect the confidentiality of the message
- To verify the integrity and authenticity of the message
Public key cryptography can be used to both encrypt and digitally sign a message, which will guarantee its confidentiality as well as its authenticity.
Vulnerabilities of public keys
It is possible for a fraudster to claim the identity of another person and even publish a public key that claims the identity of that person.
Method for verifying a public key
- Certificate authority
- E-mail address - user’s email address
- Directory infrastructure - Microsoft Active Directory
- Key fingerprint
Hashing
Hashing is the process of applying a cryptographic algorithm on a block of information that results in a compact, fixed-length “digest.”
Purpose of hashing
The purpose of hashing is to provide a unique “fingerprint” for the message or file—even if the file is very large.
A message digest
A message digest, called has is a fixed size numeric representation of the contents of a message, computed by a hash function. A message digest can be encrypted, forming a digital signature.
Digital Signatures
A digital signature is a cryptographic operation where a sender “seals” a message or file using his identity.
A digital signature is using asymmetric cryptography, in reverse order.