Asymmetric Encryption Introduction Flashcards

1
Q

Explain how a hash function works…

A

A hash function gives a unique, fixed output given an input. The output is called a digest or hash value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 2 main desirable properties of hash functions?

A
  • Irreversible
  • Collision resistant
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does it mean for a hash function to be collision resistant? Explain how this might be implemented…

A

Collision resistant means that a hash function will never output a value that is already stored in the database.

One way of ensuring this is to assign a unique number (salt) to each hash value in the database. The salt operates on has value to ensure uniqueness and avoid collision resistant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give a real life example of the use of hash functions…

A

Passwords - A login portal will need to use hashing to create a digest from the input password. This password is hashed, and the digest is stored in the database containing all user details. Salting is used to ensure that even if multiple users use the same password, the hashed value stored for their password will always be unique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In what 2 fields has asymmetric encryption made advances in?

A

Message authentication and key distribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of functions are used for Asymmetric encryption?

A

Purely mathematical functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 2 main misconceptions of Asymmetric Encryption? Why are they false?

A

More secure - Not true, security mostly relies on the key strength. DES is still yet to be broken despite being symmetric encryption. Therefore, using either is secure.
Making symmetric obsolete - Not true, symmetric is faster and less computationally costly. Therefore, asymmetric is being used for symmetric key exchanges and message authentication more and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly