Lecture 3 Flashcards

1
Q

What is important for pseudo random generators value distribution?

A

They should generate a roughly even number of 0s and 1s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the advantage of a statistical test against a pseudo random generator?

A

Its chance of predicting the key vs the chance of it successfully picking a random key. This will be 1 if the pseudo random generator is generating keys that seem random, or closer to 0 if not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the non deterministic polynomial algorithm for solving keys? What does this mean for proving pseudo random generators?

A

We can simply guess the key, as such the secureness of a pseudo random generator cannot be proven.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does a Merkle puzzle work?

A

the senders sends a large number of small encrypted texts with unknown(but short keys) the receiver brute forces one and then tells the sender publicly what the package number(contained inside with key) was, the key from inside is then used. The eavesdropper will know the number, but not the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does semantic security involve?

A

An adversary gives two messages, you encode one and return it, if the adversary can guess which message is encoded better than half the time something is rong with our pseudo random generator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does Diffie-Hellman key exchange work?

A

Alice and Bob publicly agree on a large prime p(Several thousand bits), and a primitive root g modulo p.
Alice randomly chooses 2 <= a <= p - 2 and transmits ga(mod p).
Bob randomly chooses 2 <= b <= p - 2 and transmits gb(mod p).
Alice computes (gb)a and Bob computes (ga)b.
They hash this value to get the key.

This means Eve has ga, and gb, gab cannot be computed from just these.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the idea of public key encryption? How does this relate to trapdoor functions?

A

Uses a separate key for encryption and decryption. The encryption key is public, but the decryption key is only held at one end, this can be used to hide a secret stream cipher key.
A trapdoor function is a randomised algorithm that outputs a key pair, one is the public, and one is secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly