Digital Signatures Flashcards

1
Q

What 2 problems does Public Key Encryption solve?

A

Key Management issue.
Authentication (Proving origin of data).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the formula to calculate the number of keys needed for N parties via symmetric encryption?

A

(n(n-1))/2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What problem does digital signatures solve?

A

Proving the origin of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What concepts are needed for the signature process?

A

Message, public / private key pair, hash function, signature function, signature, verification function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which 2 procedures are contained within the digital signature process?

A

Signing
Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give the notation for a reversible encryption scheme.

A

Ee(Dd(M)) = Dd(Ee(M)) = M

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give the steps of how a digital signature is created and verified…

A

1 - Jason runs a message through a hash function to create a digest.
2 - Jason feeds the digest and his private key into a signature algorithm to create a signature.
3 - Jason appends the signature to the original message and sends too B.
4 - B runs the message through the hash function to create a digest.
5 - B runs the digest and Jason’s public key through a signature verification function to verify the signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly