asymmetric ciphers (week 4) Flashcards
what is asymmetric cryptography
Asymmetric cryptography, also known as public-key cryptography,
is a process that uses a pair of related keys - one public key and one private key - to encrypt and decrypt a message and protect it from unauthorized access or use
what are 2 asymmetric ciphers concepts
message authentication (non repudiation)
message confidentiality
what is message authentication (non repudiation)
Confirmation that the sender of a message is who they claim to be
Example: Bob sends a message to Alice confirming he is the sender.
what is Message confidentiality
Protecting the content of a message from being disclosed to unauthorized parties
Example: Bob sends a confidential message to Alice
how does key sharing work in asymmetric encryption with an example:
keys that bob should know:
–> bob private key
–> bob public key
–> alice public key
keys that alice should know:
–> alice private key
–> alice public key
–> bob public key
ASCII full form
American Standard Code for
Information Interchange
what is ASCII
A 7-bit character code where every single byte represents a unique character
Asymmetric-key cryptography is first invented by _______________ in ___
Martin Hellman and Whitfield Diffie at Stanford in mid1970.
who created RSA
Ron Rivest, Adi Shamir, and Len Adleman at MIT (the Massachusetts Institute of Technology) developed the first major asymmetric- key cryptography system and published their results in 1978.
what problem does RSA solve
RSA is the most widely accepted public-key solution and it solves the problem of key distribution or exchanging keys
what is RSA based on
It is easy to find and multiply large prime numbers together, but it is extremely difficult to factor the products.
for eg 20 * 5 = 100
but what 2 numbers mutiplied together give 100 (simple example but as the number gets bigger it is harder)
how does RSA work in detail (give the math)
–> choose very large PRIME NUMBERS (p and q)
–> compute the product and call it N
–> compute the euler totient φ(n) = (p – 1) (q – 1)
–> Choose two numbers e and d where (e x d) mod T = 1 such that:
1< e < T and e co-primed with T (ie: e and T are divisible by 1 only.)
–> Publish public key (e, N).
–> Keep safe the private key (d, N)
how to encrypt in RSA
each plaintext character is converted to a representative integer value – such as
ASCII code.
Encryption = Plaintext e mod N
(ascii ** e)%N
how to decrypt in RSA
each plaintext character is converted to a representative integer value – such as
ASCII code.
Decryption = Ciphertext d mod N
(cipher ** d)%N
different types of attacks in RSA
Factorization attack
Key(s) attack
Revealed decryption exponent
attack