public key cryptography Flashcards

1
Q

public key crypto system

A

for each k, e_k is the inverse of d_k
e_k(x) and d_k(y) are easy to compute
computationally infeasible to derive d_k from e_k
feasible to compute e_k and d_k from k

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

one-way function

A

easy to compute f(x)
but computationally infeasible to find x from y

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

trap-door one way function

A

given trapdoor Information it becomes feasible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Euler phi-function

A

φ(n)=number of integers less than n and relatively prime to n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fermat’s little theorem

A

suppose p prime and b in invertible in Zp then b^p=b mod p

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Euler

A

for all b in Zn*, b^φ(n)=1 mod n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

public key (RSA)

A

(n,b) where b is the encryption exponent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

private key (RSA)

A

(p,q,a) where a is the decryption exponent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

basic method for generating big primes

A

generate a large number and test for primality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RSA problem

A

recover x given x^b mod n, n and b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

splitting

A

find n=ab where a,b are non-trivial factors of n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

strong prime

A

p-1 has a large prime factor, say r
p+1 has a large prime factor
r-1 has a large prime factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

when do strong primes offer no protection?

A

Elliptic curve method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

x is B-smooth

A

all prime factors of x are <=B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

factor base

A

set of primes below some bound B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

framework for congruent squares algorithm

A

select the factor base
collect relations between elements of the factor base producing squares
find dependencies: reduce exponents modulo 2 and use linear algebra to find a dependency modulo 2

17
Q

Dixon’s random squares

A

select z at random

18
Q

Is RSA semantically secure?

A

No, because the attacker can distinguish cipher texts

19
Q

how is decryption if we use small private exponent?

A

use CRT

20
Q

broadcast attack

A

Oscar is an external attacker. He doesn’t have a key

21
Q

Coppersmith’s theorem

A

let p be monic polynomial of degree d in one variable modulo n (of unknown factorisation)
one can find in time polynomial (long,d) all integers x0 such that p(x0)=0 mod n and |x0|<=n^{1/d}

22
Q

coppersmith’s short padding

A

let n be l bits long and x be at most l-[l/b^2] bits
if the message is sent twice with different random paddings of length less than [l/b^2] then an attacker can efficiently recover x given only the ciphertexts

23
Q

cryptographic primitive

A

basic RSA

24
Q

protocols

A

built of many primitives to achieve secure communication (perhaps data integrity too)

25
Q

most important RSA protocol

A

Optical Asymmetric Encryption Padding

26
Q

order of a group

A

number of elements

27
Q

finite group

A

order is finite

28
Q

order of an element

A

smallest positive integer m such that g^m=1

29
Q

cyclic group

A

there exists an element with order equal to the order of the group

30
Q

primitive element mod p

A

a in Zp* with order p-1

31
Q

theorem for finding primitive elements

A

a is a primitive element iff a^{(p-1)/q}/=1 for all primes q|(p-1)

32
Q

c is discrete logarithm of b in Zp*

A

a^c=b mod p