Lecture 4 - Public Key Encryption Flashcards
Describe the steps involved in ensuring confidentiality of a message.
- Bob encrypts the plaintext message using Alices public key
- The produced ciphertext message is transmitted by Bob to Alice.
- Alice decrypts the ciphertext message using her private key
Secure message format uses the recipient’s private key to protect message confidentiality.
Describe the steps involved in ensuring authenticity of a message.
- Bob encrypts the plaintext message using his private key
- The produced ciphertext message is transmitted by Bob to Alice.
- Alice decrypts the ciphertext message using Bobs public key
Open message format uses the sender’s private key to ensure authenticity.
Describe the steps involved in ensuring both confidentiality and authenticity of a message.
- Bob encrypts the plaintext message using Alice’s public key and then his own private key.
- The produced ciphertext message is transmitted by Bob to Alice.
- Alice uses Bobs public key to verify the authenticity of the message and then decrypts the ciphertext message using her private key.
True / False
Public key encryption is too slow for real-time communication
True
List three aspects that describe public key encryption
- Is an asymmetric key method
- Uses a Public key and a Private Key
- Is excellent for keeping data secure
List the three maths methods that Public Key encryption use
- Integer Factorisation (RSA)
- Discrete Logarithms (ElGamal)
- Elliptic Curve Relationships (Elliptic Curve)
Provide a definition for RSA
RSA is an asymmetric key algorithm based on factoring prime numbers
What is the greatest common divisor (gcd)
The greatest common divisor (gcd) between two numbers is the largest integer that will divide both numbers.
Example gcd(4,10) = 2
Provide a definition for a prime number
Defined as a number that can only be divided without a remainder by itself and 1
List two advantages to public key encryption
- The main advantage of this type of cryptography is its increased data security. Because users never need to transmit or reveal their private keys to anyone.
- Digital signatures that cannot be repudiated
List two disadvantages to public key encryption
- computational overhead means it is slow
- As computers get faster, brute force attacks will become more practical
RECAP LECTURE
MD5 hashing is vulnerable to what type of attacks?
Collision attacks
RECAP LECTURE
Diffie-Helman key exchange is vulnerable to what type of attacks?
MITM Attacks
RECAP LECTURE
The RSA algorithm involves three steps. List them
- Key generation
- Encryption
- Decryption
RECAP LECTURE
Fill in the blanks
RSA creates a ___ ___ (public and private) for a single user
RSA creates a key pair (public and private) for a single user