Public Key Cryptography Flashcards

1
Q

What are the two main types?

A

RSA & DSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does it work on the most basic level?

A

The sender encrypts the message using the receiver’s public key.
The receiver then uses their private key to decrypt the messsage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Diffie - Hellman allow us to create?

A

A shared secret between two parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does Diffie - Hellman work?

A
  • Two people have a common thing and a secret thing
  • They mix their common thing and secret thing
  • They share what is created with each other
  • They use the other person’s thing they created and their secret thing and mix them.
  • They both end up with the same thing at the end, thus creating a shared secret.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What must we be able to do in public key cryptography?

A
  • Encrypt using the public key

- Not be able to guess the private key given the public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a modular power function an example of?

A

A one way function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the formula for a modular power?

A

a^x mod N

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What must the inverse of a modular power be able to satisfy?

A

The inverse, y, has to satisfy:

(a^x mod N) ^ y mod N = a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the formula for RSA encryption?

A

C = M^e mod N

Where M is the message, C is the encrypted message, and e & N are the public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the formula for RSA decryption?

A

M = C^d mod N

Where M is the message, C is the encrypted message and d is the private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a network certificate?

A

A public key and user identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is a network certificate sealed?

A

With a digest and signed by a ‘trusted authority’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can certificates be chained together?

A

They are signed and sealed by the last in the chain and appended to the list
People higher up in the chain certify the authenticity of the public keys of those below them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly