PKI and Cryptographic Applications Flashcards
What are the THREE most common Public-Key Cryptosystems?
RSA, EL GAMAL and Elliptic Curve
In a Public-Key system how many keys does a user have ?
Two
What are the names of these TWO keys
Public Key - Known to everyone
Private Key - ONLY known and for the USER.
What does RSA stand for ?
Rivset, Shamir,Adleman ( These are the founders)
What are some facts about RSA
- Developed in 1977
- Worldwide standard
- Uses large PRIME NUMBERS to create key pairs
What letters represent what in the RSA formula?
C = Cipher text
P = Plain Text
e= Public Key
d = Private Key
n = p+q
Out of all the expressions/letters in the RSA formula which one is the largest number?
‘n’ as n = p+q
Why is Mark Hellman Knapsack different to RSA ?
Uses FACTORING SETS(Super increasing sets) instead of LARGE PRIME NUMBERS
What year was Mark Hellman Knapsack broken?
1984
What is Key length BEST PRACTICE ?
- Understand the encryption algorithm and Key length
- Time lines of the data ( eg. will it be sensitive for only a month then use a smaller key etc)
- MORE IMPORTANT THE DATA , STRONGER the KEY to use
If the Key length for RSA and DSA is 1024 , what is the key length for Elliptic Curve ?
160 bit
What are some facts about EL GAMAL ?
- Extension of Diffie Hellman ( Symmetric Key exchange algorithm
- Provides encryption/ decryption of messages (NOT JUST KEY)
- Developed by Dr.T.EL GAMAL
- Doubles the length of ANY message it encrypts
What are some facts about Elliptic Curve ?
- Developed by Mathematicians Neal Kobilitz and Victor Miller
- Proposed in 1985
- Harder to solve than PRIME FACTORISATION (Used by RSA)
- Only a small key is needed
What does a hash function do ?
Creates a UNIQUE MESSAGE DIGEST
What TWO things can the Message digest be used for ?
- Non-Repudiation
2. Digital Signature
What is the bit size of Message digests?
128 bits or LARGER
What functions do single digit message digests provide ?
- Parity
2. Low level/Single digit checksum
RSA requirements for HASH FUNCTIONS
- INPUT can be ANY length.
- OUTPUT has a FIXED length
- HASH FUNCTION relatively easy to COMPUTE for any input.
- HASH FUNCTION are ONE-WAY.
- COLLISION FREE ( No two messages produce the SAME hash value)
What does HAVAL stand for ?
Hash of Variable Length
What are some facts about HAVAL?
- Modification of MD5
- Uses 1024bit blocks
- Hash values 128,160,192,224,256
What hash function is a modification of MD5 ?
HAVAL
What are the FIVE hash values for HAVAL ?
128,160,192,224,256
What size block does HAVAL use ?
1024 bit
What does SHA stand for
Secure Hashing Algorithm
How many versions of SHA is there ?
3 ( SHA-1,SHA-2,SHA-3)
Out of all THREE SHA’s what one is considered SECURE?
SHA-2
Who developed SHA-1 ?
NIST
Where is SHA-1 specified as a SECURE HASH STANDARD?
FIPS-180
What length size message can SHA-1 handle ?
Any size
What is the message digest size for SHA-1?
160bit
Message length needs to be a multiple of 512, IF not then SHA will parse the message until it is a multiple of 512
What are the FOUR variants of SHA-2?
- SHA-256
- SHA-224
- SHA-512
- SHA-384
What TWO of the variants are truncated versions of SHA ?
SHA-224 & SHA-384
What is the message digest size for all FOUR of the SHA-2 variants?
SHA-256 = 256 MD
SHA-224 = 224 MD
SHA-512 = 512 MD
SHA-384 = 384 MD
What is the BLOCK SIZE for all FOUR of the SHA-2 variants?
SHA-256 = 512 bit block
SHA-224 = 1024 bit block
SHA-512 = 1024 bit block
SHA-384 = 1024 bit block
What algorithm is confirmed as the SHA-3 standard ?
KEECAK
Is SHA-3 in use ?
no, it is still in DRAFT phase.
What does MD2 stand for ?
Message Digest 2
Who developed MD2,MD4 & MD5 ?
Ronald Rivset ( One of the RSA founders)
When was MD2 developed ?
1989
What is the MD2 message digest size ?
128 bit ( Original message + CHECKSUM)
What function does MD2 NOT have ?
One way function
What size bit processor does MD2 support?
8 bit
Is MD2 still in use ?
NO
MD2 Facts ?
- Developed by Ronald Rivset in 1989 ( One of the RSA founder)
- Provide a SECURE hash function for 8 bit processors
- Pads the message so that the length is a multiple of 16 bytes.
- Computes a 16 byte CHECKSUM and ADDS it to the END of the message
- 128bit Message digest ( Original message and the added CHECKSUM) ** If CHECKSUM computed after MESSAGE DIGEST – COLLISIONS may OCCUR ( Nathanlie Rogier, Pascal Chavad)
- NO One-Way function !!!
** !! ** THIS IS NO LONGER USED ** !! **
What does MD4 stand for ?
Message Digest 4
What size bit processor does MD4 support?
32
Has the security increased in MD4 compared to MD2
YES
What size does a message length need to be for MD4 ?
Message length needs to be 64 bits less than multiple of 512 ( If not then it will pad until it reaches that)
EXAMPLE ; No answer required
EXAMPLE: 16 bit message
16 bit Message - - > Padded with 432 additional bits to make it 448 bits
16 + 432 = 448 512 - 448 = 64 ** 64 bits SMALLER than 512 **
What is the MD4 message digest size ?
128bit
What size block does MD4 process ?
512 bit block
Is MD4 still in use ?
NO
What does MD5 stand for ?
Message Digest 5
What is the MD5 message digest size ?
128bit
What size block does MD5 process ?
512bit
What size does a message length need to be for MD5 ?
Message length needs to be 64 bits less than multiple of 512 ( If not then it will pad until it reaches that)
Why was extra security added to MD5 ?
to REDUCE the speed of MESSAGE DIGEST production.
Are MD2,MD4,MD5 recommended and in use ?
MD2, MD4, MD5 - NO LONGER ACCEPTED OR RECOMMENDED
HASH Algorithms and Message Digest sizes ?
Hashing Variable Length - HAVAL ( MD5 variant )
128, 160, 192, 224, 256
Hashing Message Authentication Code ( HMAC )
Variable
Message Digest 2 ( MD2 )
128
Message Digest 4 ( MD4 )
128
Message Digest 5 ( MD5 )
128
Secure Hashing Algorithm (SHA/SHA-1)
160
SHA - 224
224
SHA - 256
256
SHA - 384
384
SHA - 512
512
What is used to implement digital signatures?
HASHING
TWO goals for DIGITAL SIGNATURES?
Non Repudiation ( Assure the receiver that the message truly came from claimed sender.)
Integrity (Assure the receiver that the message WAS NOT altered while in transit between sender & receiver)
What does digital signatures require ?
- PUBLIC KEY cryptosystem (Asymmetric)
2. HASHING function.
EXAMPLE ; No answer required
Example: Alice wants to digitally sign a message sing a hashing algorithm
- Alice generates a MESSAGE DIGEST of the message using a HASHING ALGORITHM ( SHA-1, SHA-256, SHA-512 etc)
- Alice ENCRYPTS only the MESSAGE DIGEST using her PRIVATE KEY (This is the DIGITAL SIGNATURE).
- Alice attaches the signed MESSAGE DIGEST to the PLAIN-TEXT message
- Alice sends the appended message to Bob
EXAMPLE ; No answer required
Example: Bob receives the DIGITALLY SIGNED message and does the following:
- Bob DECRYPTS the DIGITAL SIGNATURE, using Alice’s PUBLIC KEY.
- Bob uses the same HASH FUNCTION to create the MESSAGE DIGEST (MD) of the full PLAIN-TEXT message.
- Bob compares the DECRYPTED MESSAGE DIGEST (MD) received from Alice with the MESSAGE DIGEST(MD) he computed himself.
Outcomes:
IF THEY MATCH = Assured the message was sent by Alice
IF THEY DO NOT MATCH = Message not sent by Alice or modified in transit.