asymmetric ciphers (week 4) Flashcards

1
Q

what is asymmetric cryptography

A

Asymmetric cryptography, also known as public-key cryptography,

is a process that uses a pair of related keys - one public key and one private key - to encrypt and decrypt a message and protect it from unauthorized access or use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are 2 asymmetric ciphers concepts

A

message authentication (non repudiation)

message confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is message authentication (non repudiation)

A

Confirmation that the sender of a message is who they claim to be

Example: Bob sends a message to Alice confirming he is the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is Message confidentiality

A

Protecting the content of a message from being disclosed to unauthorized parties

Example: Bob sends a confidential message to Alice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how does key sharing work in asymmetric encryption with an example:

A

keys that bob should know:
–> bob private key
–> bob public key
–> alice public key

keys that alice should know:
–> alice private key
–> alice public key
–> bob public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ASCII full form

A

American Standard Code for
Information Interchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is ASCII

A

A 7-bit character code where every single byte represents a unique character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Asymmetric-key cryptography is first invented by _______________ in ___

A

Martin Hellman and Whitfield Diffie at Stanford in mid1970.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

who created RSA

A

Ron Rivest, Adi Shamir, and Len Adleman at MIT (the Massachusetts Institute of Technology) developed the first major asymmetric- key cryptography system and published their results in 1978.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what problem does RSA solve

A

RSA is the most widely accepted public-key solution and it solves the problem of key distribution or exchanging keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is RSA based on

A

It is easy to find and multiply large prime numbers together, but it is extremely difficult to factor the products.

for eg 20 * 5 = 100
but what 2 numbers mutiplied together give 100 (simple example but as the number gets bigger it is harder)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how does RSA work in detail (give the math)

A

–> choose very large PRIME NUMBERS (p and q)
–> compute the product and call it N
–> compute the euler totient φ(n) = (p – 1) (q – 1)
–> Choose two numbers e and d where (e x d) mod T = 1 such that:
1< e < T and e co-primed with T (ie: e and T are divisible by 1 only.)

–> Publish public key (e, N).
–> Keep safe the private key (d, N)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how to encrypt in RSA

A

each plaintext character is converted to a representative integer value – such as
ASCII code.

 Encryption = Plaintext e mod N

(ascii ** e)%N

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how to decrypt in RSA

A

each plaintext character is converted to a representative integer value – such as
ASCII code.

Decryption = Ciphertext d mod N

(cipher ** d)%N

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

different types of attacks in RSA

A

Factorization attack

Key(s) attack

Revealed decryption exponent
attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is a factorization attack

A

If the attacker is able to find out p and q then the attacker can find out the private key.

17
Q

what is Key(s) attack

A

A small encryption and decryption key values, e and d, are vulnerable to brute-force attack

18
Q

Revealed decryption exponent
attack

A

If the attacker can somehow guess the decryption key value, d, not only is the cipher text in danger of being revealed, but all future messages are also in danger.

19
Q

what are some other asymmetric encryption algorithms

A

Elliptic curve cryptography (ECC)

El Gamal Cryptography ( or Scheme)

Digital Signature Algorithm (DSA) & ECDSA

20
Q

what is Elliptic curve cryptography (ECC)

A

Elliptic Curve Cryptography (ECC) is a relatively newer algorithm that offers shorter keys that achieve comparable strengths compared to longer RSA keys.

It is susceptible to key-based attacks that are using the quantum computer.

21
Q

what is El Gamal Cryptography ( or Scheme)

A

El Gamal Based on the Diffie–Hellman algorithm. Like the RSA algorithm, it also works based on key generation, encryption, and decryption.

22
Q

what is Digital Signature Algorithm (DSA) & ECDSA

A

DSA implements the Digital Signature Standard (DSS) published by the National Institute of Standards and Technology (NIST) and is used for digital signatures only

23
Q

what are some differences between symmetric and asymmetric encryption in terms of key usage

A

–> In symmetric encryption the same key is used for both encryption and decryption.

–> In asymmetric encryption, two different keys, public and private keys are used for encryption and decryption.

24
Q

what are some differences between symmetric and asymmetric encryption in terms of key storage

A

–> In symmetric encryption Keys used are to be stored securely. The receiver needs the key to the ciphertext. Every key used for encryption is to be communicated to the recipient.

–> In asymmetric encryption The private key must be stored securely and never to be sent to anywhere. The public key is published and available to those who need it.

25
Q

what are some differences between symmetric and asymmetric encryption in terms of encryption and decryption

A

–>In symmetric encryption Fast and efficient for encryption and decryption of large messages/data.

–> In asymmetric encryption Significantly slow compared to symmetric
cryptosystems to encrypt/decrypt large messages.

26
Q

what are some differences between symmetric and asymmetric encryption in terms of brute force attacks

A

–> Attackers focus on techniques other than brute force attacks as it is time and resource intensive to decrypt the ciphertext without additional knowledge about the key. Attacking the key generation algorithm and key management systems are common.

–> It is possible to attack asymmetric cryptosystems with a brute force method. Using large prime numbers, 1024 to 2048-bit, will make this attack unfeasible.

27
Q

why does Key management plays a very important part in both symmetric and asymmetric encryption

A

In symmetric encryption, the same key is used for both encryption and decryption, so it is crucial that the key is kept secure and only shared with authorized parties. If the key is compromised, the security of the entire system is at risk.

In asymmetric encryption, the public key can be shared with anyone, but the private key must be kept secure and never shared. If the private key is compromised, the security of the entire system is at risk. Additionally, key management is important in asymmetric encryption because it ensures that only the intended recipient can decrypt the message using their private key, and that the sender can be verified as the true originator of the message using the public key.

28
Q

what is message digest used for ?

A

–> Message digest, hash, or checksum is a sequence of digits uniquely representing a message.

–> It is the message’s fingerprint, similar to a person’s fingerprint.

–> The message digest is used to verify the integrity of the message against unauthorised or unintentional modifications.

29
Q

what are the properties of the message digest

A

–> A hash/MD function always hashes a message to the same hash value.

–> A hash/MD function is irreversible

–> A GOOD hash/MD function hashes two different messages to two different hash values. In other words, it is resistant to a “collision”

30
Q

what is a collision

A

–> A Collision occurs when two messages produce the same message digest.

–> A collision attacks on a hash function is finding a non-sensical message that will produces the same hash value as the original message.

31
Q

what is collision prevention

A

–> Use the message digest function with a longer message digest length – similar to a longer key for encryption.

–> Example: The chance of a collision for 160-bit hash value is one in 2**160

32
Q

what are the message digest algorithms

A

Message Digest 5 (MD5)

Secure Hashing Algorithm 1 (SHA1)

Secure Hashing Algorithm 2 (SHA2)
Variety of SHA2 algorithms include SHA-256, SHA-512, SHA-224, and SHA-384

33
Q

which message digest is already broken, and not in used today for cryptographic purposes.

A

MD5

34
Q

what is Symmetric/Asymmetric Ciphers vs Message Digest

A

–> A two-way function that takes in plaintext data and turns it into a ciphertext, and vice versa
–> A one-way function that generates irreversible data’s finger print

–> Require a good key management process and system.
–> No key to manage

–> Use for confidentiality, integrity, and non-
repudiation (asymmetric cryptosystems)
–> Use for integrity verification

–> Long keys provide better security
–> Long hash digits provide better security

–> Ciphers are in the public domain
–> MD algorithms are in the public domain

–> AES, RC4, DES/3DES, RSA, ECDSA
–> MD5, SHA-1, SHA-2