Week 14 Flashcards
Appreciate that, in practice, public-key encryption is largely used for the encryption of symmetric keys
(Outline how Alice sends a message to Bob using a hybrid approach - 4 steps)
Yes appreciate š
- Alice encrypts her message with a symmetric encryption scheme, using the key k to produce ciphertext c
- Bob provides Alice with his public encryption key, e, and public param, n, so she can encrypt k using the RSA encryption scheme, producing ciphertext ke (mod n)
- Once Bob receives c and ke (mod n), he can use his private decryption key d to find **(ke)dā” k (mod n) **
- k is the symmetric scheme key, so Bob can then decrypt c with it and recover the message
Define the One-Way goal for attacking a public-key encryption scheme
Give an informal definition of semantic security of a public-key encryption scheme
Define a chosen plaintext attack on a public-key encryption scheme
Define a chosen ciphertext attack on a public-key encryption scheme
Appreciate that RSA is One-Way secure against chosen plaintext attacks provided that the RSA problem is difficult to solve
Prove that RSA is not One-Way secure against chosen ciphertext attacks
Demonstrate how to compute the Jacobi symbol of a of a message m modulo an RSA modulus n, given only n, e and me (mod n)
Describe why a Fermat Prime makes a convenient choice for an RSA encryption key