Lec 4: Asymmetric Crypto Flashcards

1
Q

How does symmetric encryption work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the problem with symmetric encryption?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does asymmetric (or public-key) encryption work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain public-key encryption [DH76,RSA77]

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the public key info look like?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is cryptography in terms of this class?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does hard mean in terms of the perfect secrecy of public key encryption?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does public-key encryption not provide?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain a non-integrity example

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do public-key signatures work in terms of Bob and Alice?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do public-key signatures work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does signing mean?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What was wrong with public-key encryption?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do we use signatures to provide integriy?

A
  1. 3rd party has table
  2. Hi bob
  3. Verify
  4. hi bob = dec()
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How did alice know apk? How did she know which entry to look up?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What questions do we ask about asymmetric?

A
17
Q

What are the advantages of public-key cryptography?

A
18
Q

What are the disadvantages of public-key encryption?

A
19
Q

How do we use cryptographic equations?

A
20
Q

What do we need to know about using asymmetric primitives?

A
21
Q

How do we explain cryptographic concepts like asymmetric and symmetric?

A