Cryptography - Asymmetric Algorithms Flashcards
Diffie Helman
Asymmetric key agreement algorithm responsible for the key agreement process
Key agreement process
1. Jim generates private and public key, Sue generates a private and public key
- Jim and Sue share their public keys
- D-H algorithm is applied to John’s private key and Sally’s public key on Jim’s machine and to Sally’s private key and John’s public key on Sue’s machine
- As a result, the same shared value is created for John and Sally which in turn creates same symmetric key on each system using the asymmetric key agreement algorithm
Provides secure key distribution but not confidentiality, authentication or nonrepudiation
Susceptible to MITM attacks unless an organization implements digital signatures or certificates at the beginning of the process
RSA
Most popular asymmetric algorithm
can provide key exchange, encryption, digital signatures
Uses 1024 to 4096 bit key and performs one round of transformation
If factorization of the prime numbers is used, implementation is considered breakable and shouldn’t be used
Uses one-way function to provide encryption/decryption and digital signature verification/generation
Public key works with one-way function to perform encryption and digital signature verification
Private key works with one-way function to perform decryption and signature generation
Attackers can use Number Field Sieve (NFS) a factoring algorithm to attack RSA
El Gamal
based on Diffie Hellman algorithm
deals with discrete logarithms, can provide key exchange, encryption, digital signatures
Any key size can be used, performance decreases with size
Key size of 1024 bits or less recommended because it’s the slowest asymmetric algorithm
Elliptic Curve Cryptography (ECC)
Provides secure key distribution, encryption, digital signatures
Can use key of any size
Can use much smaller key than RSA or any other asymmetric algorithm and still provide comparable security
Primary benefit is a smaller key size, reducing storage and transmission requirements
More efficient and better security than RSA keys of the same size
Knapsack
Series of asymmetric algorithms that provide encryption and digital signatures
No longer used due to security issues
Zero Knowledge Proof
Technique used to ensure that only minimum needed information is disclosed without giving all the details
i.e.
One user encrypts data with his private key and receiver decrypts data with the originator’s public key
Originator proves he has his private key simply because the receiver can read the message