Lec 4: Asymmetric Crypto Flashcards
How does symmetric encryption work?
What is the problem with symmetric encryption?
How does asymmetric (or public-key) encryption work?
Explain public-key encryption [DH76,RSA77]
What does the public key info look like?
What is cryptography in terms of this class?
What does hard mean in terms of the perfect secrecy of public key encryption?
What does public-key encryption not provide?
Explain a non-integrity example
How do public-key signatures work in terms of Bob and Alice?
How do public-key signatures work?
What does signing mean?
What was wrong with public-key encryption?
How do we use signatures to provide integriy?
- 3rd party has table
- Hi bob
- Verify
- hi bob = dec()
How did alice know apk? How did she know which entry to look up?