Chapter 7: Public Key Cryptography Flashcards

1
Q

Why would we need Public Key Cryptography?

A
  • Introduced ciphers and authentication mechanisms require a common, pre-shared, secret key
  • Out-of-band sharing is not always an option
  • Key exchange needs to be conducted securely
  • Symmetric mechanisms require a considerable amount of keys in the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why would we need PKI?

  • Asymmetric Crypto reduces the number of keys in the system :
    Assume n parties, only unique keys and asymmetric crypto:
A
  • Every party has a public key and a private key
  • Every party keeps their own private key secret
  • Every party publishes their public key
  • Amount of secret keys in the system: n ∈ O(n)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Different keys used for en-/decryption:
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Discussion: Symmetric vs. Asymmetric Encryption

  • Benefits of asymmetric encryption mechanisms include
  • But what about integrity and authenticity of the exchanged public key?
  • Example: Can we just …
  • … publish a public key on a website?
  • … send a public key via mail to friends?
A

1 * Number of keys needed in a communication system is reduced
2 * Public keys are not required to be exchanged between participants of the communication system via a secure
channel that guarantees confidentiality of the key

  • Certainly not, as the integrity and authenticity of the received key cannot be guaranteed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RSA Cipher Mathematical Background

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are they generated? (RSA Cipher)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RSA Cipher

Public Key Algorithm

Define encryption and decryption.

A

Why does RSA Cipher work? ON SLIDES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RSA for confidentiality

What are the assumptions?

A
  • We choose a random x andcompute c = xe mod n
  • Then x can not be recovered
  • Relation between c and x looks random enough when keys unknown
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Problems with RSA for confidentiality

In order to achieve confidentiality we need to use a suitable encryption scheme based on RSA! WHY?

A

Solution: * Employ Padding (“enlarges m”)
* Add random bits (“adds non-determinism”, “avoids 0”)
* Schemes: PKCS, OAEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RSA for Confidentiality

OAEP (Optimal asymmetric encryption padding)

Provide the notation and the output.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RSA for Integrity

Observations? Can we do Better?

A

Yes, we can do better.

  • Dedicated signature schemes exist
  • Example: RSA-PSS, part of PKCS standards
  • RSA-PSS hashes m twice, adds padding and salt
  • Result is encrypted with Ksec
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hybrid Encryption Scheme

Why do we need it, instead of asymmetric crypto? What’s the idea?

A

Problems with Asymmetric Crypto:
* Very expensive
* Orders of magnitude slower than symmetric crypto or hashing
* Unsuitable to encrypt larger amounts of data

Idea:
* Hybrid Encryption Scheme
* Use public key cryptography to securely exchange (ephemeral) symmetric key
* Use symmetric cryptography to encrypt the actual payload data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hybrid Encryption Scheme: Key Agreement

How does it work?

A

New Idea:
* Alice does not decide and send a symmetric key
* A key agreement protocol is used to establish a shared key
* Key agreement protocols usually also
* Authenticate the entities
* Provide additional communication protection
* Well-known example: Diffie-Hellman key exchange protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly