Lecture 3 & 4 Flashcards

1
Q

What’s the difference between secret key crypto and public key crypto?

A

Secret key: Symmetric key, same key used to encrypt and decrypt or to authenticate and verify.
Public key crypto: Asymmetric (two keys), One public to encrypt or verify and one private to decrypt or sign.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s reduction to a known hard problem and what does it imply?

A

Proof that if an attacker can break the system, I can use that to solve the hard problem. It implies that if the problem remain hard, the system is secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s RSA?

A

A cryptosystem, it involves the use of a pair of keys: a public key for encryption and a private key for decryption. The security of RSA is based on the difficulty of factoring the product of two large prime numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s DH (Diffie Hellman)?

A

A key exchange algorithm used to securely share cryptographic keys over an untrusted communication channel. It enables two parties to independently generate a shared secret key without directly exchanging the key itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where’s RSA used?

A

TLS, SSH, GnuPG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s DH secure against and not against?

A

Secure against passive eavesdropper
Not against active adversary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain how DH works

A
  1. Parties agree on publicly known parameters: a large prime number (p) and a primitive root modulo p (g).
    These parameters are shared openly and can be used by anyone.
  2. Each party independently generates a private key (a for Party A and b for Party B). These keys are kept secret.
  3. Compute public key:
    A = g^a mod p, B = g^b mod p
    Exchange private key
  4. Ka= B^a = (g^b)^a=g^^ba=(g^a)^b=A^b=Kb
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does PRNG and DRBG stand for?

A

PRNG: Pseudorandom number generator
DRBG: Deterministic random bit generator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CSPRNG’s have many security notions, but one of them is significantly important. Name and describe the notion.

A

The next-bit test: If an adversary is given the “i” first bits of an output, he should not be able to guess the bit “i + 1” (next bit) with a higher chance than 50%.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a signature a public-key version of?

A

A signature is a public key version of a MAC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s forward secrecy in DH?

A

That the compromise of a secret key does not compromise the secrecy of past communication sessions. In other words, even if a long-term private key is later exposed, it should not be possible to retroactively decrypt past communications that were secured using that key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are signatures good for?

A
  • Prove who (which signing key) signed a message (Authenticity)
  • Ensures a message has not been tampered with (Integrity)
  • The signer cannot deny having signed a message once signed (non-repudiation)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s ephemeral Diffie Hellman and how does it relate to security?

A

DFE (Diffie Hellman Ephemeral) creates new temporary keys for a session. This helps with forwards secrecy, if a secret key is compromised it does not compromise the data of old conversations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly