Cryptographic Primitives Flashcards
Give the 3 security properties of a hash function (D‑P‑S).
Determinism, Pre‑image resistance, Second pre‑image (collision) resistance.
One‑line definition of symmetric encryption.
Encrypt and decrypt with the same secret key shared by sender and receiver.
Symmetric encryption: 1 pro & 1 con.
Pro: very fast; Con: secure key exchange required.
One‑line definition of asymmetric encryption.
Encrypt with a public key, decrypt with the corresponding private key.
Asymmetric encryption: 1 pro & 1 con.
Pro: no pre‑shared secret; Con: slower, needs public‑key authentication to avoid MITM.
Hybrid crypto example used on the web.
TLS/HTTPS — public key sets up a symmetric session key; bulk data encrypted symmetrically.
Three guarantees of a digital signature.
Authentication, Integrity, Non‑repudiation.
Four steps to sign & verify a message.
Hash → Sign with private key → Send message+signature → Receiver hash & verify with public key.
Does a digital signature provide confidentiality?
No — it proves origin and integrity but does not hide the message contents.
Why is SHA‑256 stronger than MD5?
SHA‑256 collision attacks are still infeasible; MD5 collisions found quickly on standard hardware.