Lecture 3 & 4 Flashcards
What’s the difference between secret key crypto and public key crypto?
Secret key: Symmetric key, same key used to encrypt and decrypt or to authenticate and verify.
Public key crypto: Asymmetric (two keys), One public to encrypt or verify and one private to decrypt or sign.
What’s reduction to a known hard problem and what does it imply?
Proof that if an attacker can break the system, I can use that to solve the hard problem. It implies that if the problem remain hard, the system is secure
What’s RSA?
A cryptosystem, it involves the use of a pair of keys: a public key for encryption and a private key for decryption. The security of RSA is based on the difficulty of factoring the product of two large prime numbers.
What’s DH (Diffie Hellman)?
A key exchange algorithm used to securely share cryptographic keys over an untrusted communication channel. It enables two parties to independently generate a shared secret key without directly exchanging the key itself.
Where’s RSA used?
TLS, SSH, GnuPG
What’s DH secure against and not against?
Secure against passive eavesdropper
Not against active adversary
Explain how DH works
- Parties agree on publicly known parameters: a large prime number (p) and a primitive root modulo p (g).
These parameters are shared openly and can be used by anyone. - Each party independently generates a private key (a for Party A and b for Party B). These keys are kept secret.
- Compute public key:
A = g^a mod p, B = g^b mod p
Exchange private key - Ka= B^a = (g^b)^a=g^^ba=(g^a)^b=A^b=Kb
What does PRNG and DRBG stand for?
PRNG: Pseudorandom number generator
DRBG: Deterministic random bit generator
CSPRNG’s have many security notions, but one of them is significantly important. Name and describe the notion.
The next-bit test: If an adversary is given the “i” first bits of an output, he should not be able to guess the bit “i + 1” (next bit) with a higher chance than 50%.
What is a signature a public-key version of?
A signature is a public key version of a MAC.
What’s forward secrecy in DH?
That the compromise of a secret key does not compromise the secrecy of past communication sessions. In other words, even if a long-term private key is later exposed, it should not be possible to retroactively decrypt past communications that were secured using that key.
What are signatures good for?
- Prove who (which signing key) signed a message (Authenticity)
- Ensures a message has not been tampered with (Integrity)
- The signer cannot deny having signed a message once signed (non-repudiation)
What’s ephemeral Diffie Hellman and how does it relate to security?
DFE (Diffie Hellman Ephemeral) creates new temporary keys for a session. This helps with forwards secrecy, if a secret key is compromised it does not compromise the data of old conversations.