Public-Key Cryptography - Topic 4 Flashcards

1
Q

Problems with symmetric cryptography

A

non-repudiation cannot be achieved without the involvement of a third trusted party

A different key is required for each pair of users, or even per encryption - session key
- An n user system requires n*(n-1)/2 keys - the n^2 problem
- Generating and distributing is hard
- Maintaining security for keys already distributed also a challenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is public key cryptography (PKC)?

A

Keys come in pairs - one public, one private; it is infeasible to generate one key from the other; encryption produced by using one of the keys could only be reversed by the other key in the pair.

Easy to generate keys (public and private)

Hard to compute private key from public key

Easy to encrypt and decrypt if the right key is known

Hard to recover plaintext from ciphertext without the right key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a one-way function?

A

C = f(M) “Easy”
C = f-1(M) “Infeasible”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trap-door one way function

A

C = f(K,M) “Easy” if K & M known

M = f-1(K, C) “Easy” if K & C known

M = f-1(K, C) “Infeasible” if K not know, C known

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some commonly used one-way functions?

A

Integer factorisation (used in RSA)
- Finding prime factors of a large integer: n=p*q
- n is known
- find p and q

Discrete logarithm (Used in DSS/DSA (Digital Signature Standard/Digital Signature Algorithm) and DH (Diffie-Helman))
- a^x = b mod p
- a, b and p are known
- finding an integer, x, satisfying the equation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which three algorithms work for both encryption and decryption signatures

A

RSA, ElGamal and Rabin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can you achieve confidentiality (Secrecy) with PKC

A

Encrypted with a public key and decrypted with a private key, should only be used for short messages, like secure transportation of a symmetrical key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can you achieve authenticity with PKC?

A

Signature is signed on the hash value of M, i.e. H(M), and a timestamp should be included

Message is encoded with a private key and signed with the hash of M, then decoded with a public key and M to verified signedH(M)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is RSA commonly used for?

A

Confidentiality
- Encrypt the plaintext M using recipient’s public key;
- As only the recipient has the corresponding private key, so M can only be read by the recipient

Digital Signature
- message authenticity (message origin authenticity and content integrity) and non-repudiation of message origin
- Sign M (actually the hash of M) using sender’s private key;
- As only the sender has this private key, so the message must have been signed by the sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of cipher is RSA?

A

A block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three functions of RSA?

A

Key generation
Encryption
Decryption

Encryption and decryption use the same function with different keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly