public key Flashcards
What is public-key cryptography also known as
A: Asymmetric cryptography.
Q: What was the basis for most cryptographic systems before public-key cryptography?
A: Substitution and permutation.
What are public-key algorithms based on?
Mathematical functions.
How does public-key cryptography differ from symmetric encryption?
Public-key cryptography uses two separate keys, whereas symmetric encryption uses only one key.
: Does public-key encryption inherently offer greater security against cryptanalysis than symmetric encryption?
A: No, security depends on the length of the key and the computational effort required to break the cipher.
Has public-key encryption made symmetric encryption obsolete?
No, symmetric encryption is still widely used due to the computational overhead of public-key encryption.
What are the three main applications of public-key cryptosystems?
Encryption/decryption, digital signatures, and key exchange.
How is a message encrypted and decrypted in public-key cryptosystems?
The sender encrypts a message with the recipient’s public key, and the recipient decrypts it with their private key.
How is a digital signature created?
By applying a cryptographic algorithm to the message using the sender’s private key.
What is key exchange in public-key cryptosystems
A process where two parties cooperate to exchange a session key for symmetric encryption.
Name some asymmetric encryption algorithms.
A: RSA, Diffie-Hellman, Secure Socket Layer (SSL), and Secure Shell (SSH).
Why is RSA considered a slow algorithm?
Due to its computational overhead, it is less commonly used to directly encrypt user data.
What is the RSA algorithm known for
Being the most widely used public-key cryptography algorithm.
Who developed the RSA algorithm and when?
Ron Rivest, Adi Shamir, and Len Adleman in 1977.
What are the key pairs used in RSA
A: Public key = {e, n}, private key = {d, n}.