Public Key Crptography (week 10) Flashcards

1
Q

What principle did William Stanley Jevons illustrate with his factorisation example?

A

The difficulty of reversing factorisation underpins RSA security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who invented the RSA algorithm?

A

Ron Rivest, Adi Shamir, and Leonard Adleman.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the key components required for RSA key generation?

A

Two large prime numbers (p, q) and a public/private key pair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does public key encryption ensure confidentiality?

A

The sender encrypts data with the recipient’s public key; only the recipient can decrypt it using their private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is non-repudiation in public key cryptography?

A

Proof that a message was sent by the claimed sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is encrypting the entire document often unnecessary in practice?

A

Encrypting a hash is faster and provides equivalent authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two processes combined for confidentiality and authentication?

A

Encrypting with the recipient’s public key and signing with the sender’s private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can Bob verify Linda’s identity using public key cryptography?

A

Using Linda’s public key to decrypt her signed message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Certificate Authority (CA)?

A

An entity that issues digital certificates to verify identities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What role does a Registration Authority (RA) play in public key infrastructure?

A

It verifies user requests before certificates are issued.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Web of Trust model?

A

A decentralized method where users vouch for each other’s keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is the Web of Trust difficult to manage in practice?

A

Trust chains can be complex and difficult to maintain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the primary role of Pretty Good Privacy (PGP)?

A

Encrypting and signing emails for privacy and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does the Estonian ID-Card model ensure public key verification?

A

Through government-backed digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the key properties of cryptographic hash functions?

A

Deterministic, fast, irreversible, and collision-resistant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is MD5 considered flawed for modern security purposes?

A

It is vulnerable to collision attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What hash algorithm is recommended for modern applications?

A

SHA-256 or SHA-3.

18
Q

How does Linux secure passwords using hashing and salts?

A

By combining a password with a unique salt before hashing.

19
Q

What is the purpose of a Message Authentication Code (MAC)?

A

To ensure data integrity and authenticity.

20
Q

How does a Digital Signature ensure message authenticity?

A

By signing the message with the sender’s private key.

21
Q

What is the Diffie-Hellman key exchange?

A

A method for securely exchanging cryptographic keys.

22
Q

Why is public key cryptography not used for real-time encryption?

A

It is slower than symmetric encryption methods.

23
Q

What vulnerability exists in the Diffie-Hellman exchange?

A

Man-in-the-middle attacks if authentication isn’t applied.

24
Q

How can you mitigate a man-in-the-middle (MITM) attack in Diffie-Hellman?

A

Use digital certificates to verify identity.

25
Q

What does GSM stand for?

A

Global System for Mobile Communications.

26
Q

What is the primary purpose of GSM encryption?

A

To protect voice and data transmission over mobile networks.

27
Q

How does GSM encryption use XOR for secure communication?

A

By combining plaintext with a generated keystream.

28
Q

What is the relationship between XOR and addition modulo 2?

A

They are mathematically identical.

29
Q

Why does XOR provide better security than AND or OR in encryption?

A

XOR’s output reveals no direct information about the inputs.

30
Q

How does GSM’s A5 stream cipher generate a key?

A

Using the session key (Kc) and frame number.

31
Q

What is the role of the SIM card in GSM encryption?

A

It stores the secret key for generating Kc.

32
Q

What is the significance of the session key (Kc) in GSM encryption?

A

It is unique for each communication session.

33
Q

Why is the A5/1 cipher considered vulnerable?

A

It can be cracked using rainbow tables and brute force.

34
Q

What encryption algorithms replaced A5/1 in later generations of mobile communication?

A

A5/3, Kasumi, and AES.

35
Q

What are the key differences between 3G, 4G, and 5G encryption methods?

A

Each iteration improved encryption strength and added enhanced authentication methods.

36
Q

How does AES improve security in modern mobile communication?

A

With stronger encryption keys and improved performance.

37
Q

What is the role of a pseudo-random key stream in GSM encryption?

A

It ensures data appears random to attackers.

38
Q

Why is XOR encryption reversible using the same XOR operation?

A

XORing twice with the same key cancels out the original encryption.

39
Q

What property makes XOR ideal for encryption?

A

Its ability to easily encrypt and decrypt data by repeating the same process.

40
Q

What logic gate does XOR resemble?

A

The exclusive OR (XOR) gate in digital logic.