Chapter 4 and 5: Public Key Cryptography/ Hash functions Flashcards

1
Q

There are two keys describe the public key and private key to the sender and recipient

A

sender uses recipients public key to encrypt

Recipient uses private key to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Public key cryptography is based on….

A

trap door one way function, one way meaning it is easy to compute in one direction but hard in the other direction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a digital signature

A

sign by encrypting with your private key, any one can verify the signature by decrypting with public key.but ONLY YOU could have signed it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the general knapsack is …

A

NP-complete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

general knapsack is ..

A

hard to solve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

super increasing knapsack

A

is easy to solve, each weight greater than the sum of all previous weights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the weakness of knapsack

A

Trap door, one way, lattice reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trapdoor with knapsack is

A

convert SIK into general knapsack using modular arithmetic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

one way knapsack is

A

general knapsack easy to encrypt, hard to solve.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

knapsack is secure or insecure

A

insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RSA

A

2 large prime numbers, N=pq is the modulus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RSA public key is

A

(N,e)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RSA private key is

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what breaks the RSA

A

factoring the modulus breaks the RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is Diffie Hellman (g^a and g^b)

A

Not used for encrypting or signing

it is based on discrete log problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

in diffie hellman what can trudy find to get k

A

trudy can find a or by then she gets the key k , if trudy can solve discrete log problem she can find a or b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what must you be aware of in MIM

A

Man in the middle, attack on diffie hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

digital signature provides what

A

provides integrity and on repudiation

19
Q

No non-repudiation with ..

A

Symmetric keys

20
Q

what does the certificate contain

A

it contains the name of the user and users public key and other info. it is signed by the issuer a CA certificate authority

21
Q

the signature on a certificate is verified using what

A

CA’s public key.

22
Q

what is PKI

A

Public key infrastructure: the stuff needed to securely use public key crypto

23
Q

what are the three PKI trust models

A

Monopoly model, oligarchy model, anarchy model

24
Q

what are the plus’s in symmetric key

A

sped, no public key infrastructure (PKI) needed

25
what are the plus's in public key
signatures (non-repudiation) | no shared secret (but, private keys...)
26
what are the 5 things a crypto hash function must have?
``` Compression- output length is small efficiencry- easy to compute for any x one-way wak collision resistance strong collision resistance ```
27
what are the popular crypto hashes
MD5 and SHA-1
28
what is MD5
128 bit output MD5 collisions are easy to find invented by Rivest
29
what is SHA-1
160 but output | a U.S government standard inner workings similar to MD5
30
what is HMAC
a hashed MAC
31
where are hash's used
``` authentication message integrity message fingerprint data corruption detection digital signature efficiency ```
32
Spam reduction work for the sender is
2 to the N hashes
33
spam reduction work for the recipient is
always 1 hash
34
spam reduction chose n that is
work acceptable for normal email user | work is too high for spammers
35
where do we use random numbers
generate keys symmetric keys RSA: prime numbers Diffie Hellman: secret values
36
what is entropy
is a measure of randomness
37
where are random numbers being used to gnerate keys
Symmetric keys RSA: prime numbers Diffie Hellman: Secret values
38
cards that are shuffled what factor
52! > 2^225 possible shuffles
39
Randomness two features
can get quality random bits by such methods | BUT quantity of bits is very limited
40
what is watermark's two features
visibility and robustness
41
describe visibility in water mark
Invisible- watermark is not obvious | visible such as TOP SECRET
42
what are the two features in robustness
robust and fragile
43
describe robust
robust is readable even if attacked example add robust invisible mark to digital music, if pirated music appears on internet can trace back to original soure of leak
44
describe fragile
fragile is damaged if attacked example add fragile invisible mark to audio file, if watermark is unreadable, recipient knows that audio has been tampered integrity