chapter 8 Flashcards
What is the purpose of encrypting a message with a public key in public key cryptography?
to ensure that only the holder of the private key can decrypt the masseges
What is a key issue with public keys being publicly available?
Anyone could claim a public key as theirs
What is a Certificate Authority (CA)?
A trusted third parties verify the public to ensure the authenticity
How does a CA help in public key infrastructure?
: It verifies the identity of the public key holder, ensuring that the key truly belongs to the claimed owner.
What is a digital signature?
the sender signs the message with a private key and allow the receiver to verify the sign
What are the steps in the digital signature process?
A: 1. Sender encrypts part of the message with their private key.
2. Sends the message and signature.
3. Receiver decrypts the signature using the sender’s public key.
name four algorithms used for digital signatures.
1.RSA, 2.ECC , DSA ,Elgmal Signture shceme
What is key exchange in cryptography?
A process where two parties cooperate to exchange a session key securely.
Q: Which algorithm is commonly used for secure key exchange?
Diffie-Hellman.
Q: What is the purpose of a session key in key exchange?
To provide a shared key for symmetric encryption between two users.
What does Public Key Infrastructure (PKI) consist of?
system combining of software services encryption to secure internet communication and transactions
What are the main components of PKI?
Certificates, public key cryptography, and certification authorities.
List the five main uses of Public Key Infrastructure (PKI).
Authentication, Integrity, Privacy, Authorization, Non-repudiation.