Public Key Recap Flashcards

1
Q

How do Public Keys perform en/decryption?

A

Through a key pair. One is used for encryption and the opposite is used for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the two keys is shared?

A

The Public Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the disadvantage of Public Key encryption?

A

Too slow for real-time communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two main applications of public key encryption?

A

Identity checking and key protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does RSA leverage as a difficulty factor?

A

It produces large prime numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does homomorphic encryption allow?

A

Performing mathematical operations on ciphered values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is RSA not well-suited for embedded systems?

A

Because of the heavy overhead on processors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is and improved solution to RSA?

A

Elliptic Curve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Elliptic Curve often used for?

A

Key exchange methods (i.e. Elliptic Curve Diffie Hellman (ECDH)) and digital signatures (i.e. Elliptic Curve Digital Signature Algorithm (ECDSA))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the main advantages of Elliptic Curve methods?

A

Small keys (the prime number is typically 160-bits).
The creation of curves is difficult to crack.
Can factor values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of cryptography does Bitcoin use?

A

Elliptic Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is El Gamal?

A

A public key method that is used for encryption and digital signatures. It uses discrete logarithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Cramer-Shoup?

A

Public key encryption. An extension of El Gamal that adds one-way hashing to prevent adaptive chosen ciphertext attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does Paillier Cryptosystem support?

A

Homomorphic encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the four steps to send a digitally signed message using public key cryptology?

A

Sender signs a message with sender’s private key.
Sender encrypts message with receiver’s public key.
Receiver decrypts message with receiver’s private key.
Revceiver verifies message with sender’s public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the five steps to send a hashed message?

A

Sender produces a message hash and encrypts it using the sender’s private key.
Sender encrypts original message and encrypted hash with the receiver’s public key.
Receiver decrypts with receiver’s private key.
Receiver decrypts original hash with sender’s public key.
Reveiver computes hash of the original message and compares it to the original hash for authenticity.