Lecture 13: Public Key Cryptography Part 2 Flashcards
Explain the Diffie-Hellman key exchange
See slide 5 in set 28
Explain the protocol for the Diffie-Hellman key exchange
See slide 6 in set 28
What can Z be used to compute and how i.t.o the Diffie-Hellman key exchange
Z can be used to compute a key (e.g. AES) by using a key derivation function based on a public hash function
Explain the Diffie-Hellman key exchange example on slide 7 in set 13
See slide 13 in set 28
Determine the shared key/common secrete i.t.o the Diffie-Hellman key exchange if:
p = 181 g = 2 a = 50 b = 33
See slide 13 in set 28
Comment on the security of the Diffie-Hellman key exchange
An attacker who finds discrete logarithms breaks the protocol
- -> interception g^a mod p and taking the discrete log to get a
- -> computing (g^b)^a in the same way as Bob
No better way known for a passive adversary than by taking discrete logs
–> it is unknown if there is a better way
What does the security of the Diffie-Hellman key exchange rely on?
Difficult log problem
Are the messages between Bob and Alice authenticated in the basic Diffie-Hellman key exchange?
no, not authenticated
I.t.o the Diffie-Hellman key exchange, what is required for Alice/Bob to know how Z (secrete) is shared?
authenticated messages
What is the general idea of the MITM attack on the Diffie-Hellman key exchange?
The adversary sets up 2 keys, 1 with Alice and 1 with Bob, and relays messages between the 2
What is the authentication feature of Diffie-Hellman key change?
Authentication can be added using digital signatures
Explain the authenticated Diffie-Hellman key exchange
See slide 10 set 13
What do both parties know in the authenticated Diffie-Hellman key exchange
Both parties know each other’s public signature verification key
What is an ephemeral key?
key used once and then discarded
Is the protocol on slide 10 in set 13 a static or ephemeral protocol?
ephemeral
What are happens in the static Diffie-Hellman protocol?
See slide 11 in set 13
What makes the static Diffie-Hellman protocol that makes it static?
Long term private keys are chosen by Alice and Bob an they find a shared secrete that is static.
This secrete stays the same until Alice and Bob change their public keys
What is the Elgamal cryptosystem used for?
encryption and signature
What is the key idea of the Elgamal cryptosystem
Alice combines her ephemeral private key with Bob’s long-term public key
Explain the key generation process in the Elgamal cryptosystem
See slide 14 in set 13