Public Key Recap Flashcards
How do Public Keys perform en/decryption?
Through a key pair. One is used for encryption and the opposite is used for decryption.
Which of the two keys is shared?
The Public Key
What is the disadvantage of Public Key encryption?
Too slow for real-time communications.
What are the two main applications of public key encryption?
Identity checking and key protection
What does RSA leverage as a difficulty factor?
It produces large prime numbers.
What does homomorphic encryption allow?
Performing mathematical operations on ciphered values.
Why is RSA not well-suited for embedded systems?
Because of the heavy overhead on processors.
What is and improved solution to RSA?
Elliptic Curve
What is Elliptic Curve often used for?
Key exchange methods (i.e. Elliptic Curve Diffie Hellman (ECDH)) and digital signatures (i.e. Elliptic Curve Digital Signature Algorithm (ECDSA))
What are the main advantages of Elliptic Curve methods?
Small keys (the prime number is typically 160-bits).
The creation of curves is difficult to crack.
Can factor values.
What type of cryptography does Bitcoin use?
Elliptic Curve Cryptography
What is El Gamal?
A public key method that is used for encryption and digital signatures. It uses discrete logarithms.
What is Cramer-Shoup?
Public key encryption. An extension of El Gamal that adds one-way hashing to prevent adaptive chosen ciphertext attacks.
What does Paillier Cryptosystem support?
Homomorphic encryption.
What are the four steps to send a digitally signed message using public key cryptology?
Sender signs a message with sender’s private key.
Sender encrypts message with receiver’s public key.
Receiver decrypts message with receiver’s private key.
Revceiver verifies message with sender’s public key.