public key Flashcards

1
Q

What is public-key cryptography also known as

A

A: Asymmetric cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q: What was the basis for most cryptographic systems before public-key cryptography?

A

A: Substitution and permutation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are public-key algorithms based on?

A

Mathematical functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does public-key cryptography differ from symmetric encryption?

A

Public-key cryptography uses two separate keys, whereas symmetric encryption uses only one key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

: Does public-key encryption inherently offer greater security against cryptanalysis than symmetric encryption?

A

A: No, security depends on the length of the key and the computational effort required to break the cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Has public-key encryption made symmetric encryption obsolete?

A

No, symmetric encryption is still widely used due to the computational overhead of public-key encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three main applications of public-key cryptosystems?

A

Encryption/decryption, digital signatures, and key exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is a message encrypted and decrypted in public-key cryptosystems?

A

The sender encrypts a message with the recipient’s public key, and the recipient decrypts it with their private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is a digital signature created?

A

By applying a cryptographic algorithm to the message using the sender’s private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is key exchange in public-key cryptosystems

A

A process where two parties cooperate to exchange a session key for symmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name some asymmetric encryption algorithms.

A

A: RSA, Diffie-Hellman, Secure Socket Layer (SSL), and Secure Shell (SSH).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is RSA considered a slow algorithm?

A

Due to its computational overhead, it is less commonly used to directly encrypt user data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the RSA algorithm known for

A

Being the most widely used public-key cryptography algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who developed the RSA algorithm and when?

A

Ron Rivest, Adi Shamir, and Len Adleman in 1977.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the key pairs used in RSA

A

A: Public key = {e, n}, private key = {d, n}.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of the Diffie-Hellman key exchange algorithm?

A

To securely exchange a key for symmetric encryption.

17
Q

What mathematical problem underpins the security of Diffie-Hellman?

A

The difficulty of computing discrete logarithms.

18
Q

How does Diffie-Hellman establish a shared secret?

A

Both parties generate private values and exchange corresponding public values to compute the shared key.

19
Q

What is a potential vulnerability in the Diffie-Hellman key exchange

A

Man-in-the-middle attack.

20
Q
A