Cryptography Intro Flashcards

1
Q

Asymmetric Encryption uses how many keys

A

2- 1 for encryption, 2 for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does asymmetric encryption work?

A

Each user has pair of keys that are mathematically paired.
User has other people’s public keys to encrypt user’s messages to that person. Recipient uses his private key to decrypt message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which encryption method takes longer?

A

asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

which method is better at protecting confidentiality? asymmetric or symmetric encryption?

A

symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

which method is preferred to securely distributing a session key?

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If we have N users, how many keys are needed for symmetric encryption? how many keys are needed for asymmetric encryption?

A

N^2 for symmetric encryption
2*N for asymmetric encryption

asymmetric encryption is better for scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what’s the solution to public key forgery?

A

using a public key certificate to authenticate the original owner of the public key

a public key certificate consists of his public key, user id, name, address, CA’s time of certificate validity and the whole thing is signed using the “certificate authority (CA)”’s private key. This is hashed and becomes the digital signature.

The recipient can use the owner’s public key & info and hash it. This is hash1. The recipient then takes the CA’s public key to decrypt the owner’s digital signature, which creates hash2.

If hash1=hash2, then the public key certificate has been validated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does the recipient of a message encoded by asymmetric encryption verify authenticity (ie., check for forgery)?

A

Hash1 = sender’s public key & info and hash it
Hash2 = digital signature & decrypt it w CA’s public key
if Hash1 == Hash2, then message is not forged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If sender and receiver don’t first have to arrange a shared secret key in digital envelopes, how does the sender get the shared secret key to the receiver?

A

Sender encrypts the message with the “shared secret key” before the key is shared and then encrypt the shared secret key with the receiver’s public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T or F: secret key is input to the encryption algorithm

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly