Crypto - 4. Public Crypto Flashcards
What is the primary distinction between symmetric and asymmetric cryptography?
Symmetric cryptography uses the same key for encryption and decryption, while asymmetric cryptography uses a public key for encryption and a private key for decryption.
Fill in the blank: A key used in asymmetric cryptography for encryption is known as a ______ key.
Public
What is a man-in-the-middle attack?
An attack where a third party intercepts and potentially alters communication between two parties without their knowledge.
How does Public Key Infrastructure (PKI) enhance security?
PKI binds public keys to verified identities using certificates issued by trusted Certification Authorities (CAs).
What is the purpose of a digital certificate in PKI?
To associate a public key with its owner and verify the owner’s identity using a CA-issued signature.
Fill in the blank: The ______ model allows users to manually verify and sign keys, often used in PGP.
Web of trust
List three mathematical problems that public-key algorithms rely on.
Factorization, discrete logarithm problem, and elliptic curve mathematics.
Explain hybrid encryption and its benefit.
Hybrid encryption combines asymmetric and symmetric encryption, leveraging both speed and security by encrypting data with a symmetric key and securing that key with asymmetric encryption.
Fill in the blank: In hybrid encryption, the symmetric key is encrypted with the ______ key of the recipient.
Public
What is the role of modular arithmetic in RSA?
It allows secure computation over large numbers, fundamental to the encryption and decryption processes in RSA.
Define Bezout’s Identity in relation to cryptography.
Bezout’s Identity states that for any integers a and b, there exist integers x and y such that ax + by equals their greatest common divisor (gcd).
How is RSA security achieved?
RSA’s security relies on the difficulty of factoring large numbers, specifically the product of two large primes.
Fill in the blank: The public key in RSA consists of the modulus n and the ______ exponent.
Encryption
Explain the RSA encryption process briefly.
Encryption is done by raising the plaintext message m to the power of the encryption exponent e and taking the modulus n: c = m^e mod n.
Why are textbook RSA implementations discouraged?
Textbook RSA lacks padding, making it vulnerable to various attacks like chosen plaintext attacks.