asymmetric cryptography Flashcards

1
Q

positives of asymmetric encryption

A

can be used to send secret keys
dont need secure key exchange
dont need trust between sender and reciever

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

negatives of asymmetric encryption

A

slow encryption speed
security issues with encryption long plaintexts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what does the diffie-hellman key exchange do

A

allows you to share a secret key without prior knowledge of the person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how does the diffie-hellman key exchange work

A

both the sender and receiver have a prime number p and generator g(system wide)
they then both choose their own secret number between 1 and p -1
both calculate g ^ chosen number and send them to eachother
once recieved they then do that key ^ of their chosen number
not the generator has been put to the power of both numbers which means that they both now have the same value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

why does the diffie hellman key exchange work

A

due to the discreet log problem
makes it mathematically hard to figure out what the first number the g was put to the power to is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how does an asymmetric encryption system work

A

public key is available to everyone and is used to encrypt whilst the private key is used to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are three examples of asymmetric encryption systems

A

el gamal
rsa
rabin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how is rsa deterministic

A

if you use the same plaintext then youll get the same cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how do we make rsa not deterministic

A

using rsa-oaep; rsa with optional asymmetric encryption padding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how do we encrypt with rsa

A

using the public key (n,e)
cipher = m^e mod n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how do we decrypt with rsa

A

using the private key d and n from the public key
plaintext = c^d mod n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how do we encrypt with rsa-oeap

A

generate a random value r
a = hash1(r) XOR message
b = hash2(a) XOR r
ciphertext = (a||b)^e mod n ; concatenate a and b then encrypt with public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how do we decrypt with rsa-oeap

A

firstly using the secret key to decrypt gets (a||b) by performing c^d mod n
using the hash to get r; hash2(a) XOR b = r
using the hash to get m; hash1(r) XOR a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how do we sign with rsa signatures

A

apply the decryption algorithm using the secret key
a = hash(m)
signature = a^d mod n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how do we verify rsa signatures

A

apply the encryption algorithm with the public key
a = (sig)^e mod n
verify hash(m) = a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly