Lec 4: Asymmetric Crypto Flashcards
How does symmetric encryption work?

What is the problem with symmetric encryption?

How does asymmetric (or public-key) encryption work?

Explain public-key encryption [DH76,RSA77]

What does the public key info look like?

What is cryptography in terms of this class?

What does hard mean in terms of the perfect secrecy of public key encryption?

What does public-key encryption not provide?

Explain a non-integrity example

How do public-key signatures work in terms of Bob and Alice?

How do public-key signatures work?

What does signing mean?

What was wrong with public-key encryption?

How do we use signatures to provide integriy?
- 3rd party has table
- Hi bob
- Verify
- hi bob = dec()

How did alice know apk? How did she know which entry to look up?

What questions do we ask about asymmetric?

What are the advantages of public-key cryptography?

What are the disadvantages of public-key encryption?

How do we use cryptographic equations?

What do we need to know about using asymmetric primitives?

How do we explain cryptographic concepts like asymmetric and symmetric?
