Lecture 8-Public Key Cryptography/RSA Flashcards
What is the importance of modular inversion?
If an inverse of an element in set Zn exists, then the function is invertible
What is Fermat’s Theorem?
A way to compute inverses but only works on prime numbers
What is Euler’s generalization of fermat’s?
It is the basis of RSA cryptography (what you coded)
What is a hard problem to solve in the RSA case?
Dlog(discrete log). Given g^x compute x in Zp
What is a trapdoor function?
A way to revert a public key encryption using a secret key
How does PK encryption from TDF work?
Apply trapdoor function to a random value x using public key. Then hash x to create the key you use to encrypt the message. Results in output(y,c) where c is ciphertext and y is the output of trapdoor function. When you decrypt, use y on inverse of the trapdoor function applied and use secret key to get x back. Then hash x again to get the key. Use that key with the ciphertext to decrypt message
What proves that the PK encryption from TDF is secure?
If Trapdoor is a secure TDF, The symmetric encryption algorithm provides authenticated encryption, and the hash is random
Why is RSA Trapdoor function secure?
Easy to go from m to m^e mod N and hard to go the other way (easy only if d is known)