Week 16 Flashcards

1
Q

Describe the three components of a digital signature scheme

A
  1. Key generation
    randomised algorithm
    generates a keypair (secret signing key 𝒃 + public verification key 𝒗)
    also generates some public params
  2. Signature generation
    possibly randomised algorithm
    takes public params, message 𝒎 and signing key 𝒃
    outputs a signature S(𝒎, 𝒃)
    (only the owner of secret signing key 𝒃 can generate signatures)
  3. Signature verification
    algorithm that takes public params, message 𝒎, signature and public verification key 𝒃
    either accepts or rejects the claim that the signature is valid on the message by the owner of the verification/signing key 𝒃
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the RSA signature scheme

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Use the RSA signature scheme to generate signatures and verify signatures

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define the total break, selective forgery and existential forgery attack goals for a digital signature scheme

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define the passive attack, known message attack and chosen message attack attack models for a digital signature scheme

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Appreciate that if the RSA problem is hard then RSA signatures are secure against selective forgery under a passive attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe how to create an existential forgery for the RSA signature scheme using a passive attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe how to create a selective forgery for the RSA signature scheme using a chosen message attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Appreciate that hash functions are a useful tool in cryptography

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Appreciate that SHA-256 is a hash function that is currently very widely used

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define the security properties of collision resistance, preimage resistance and second preimage resistance for a hash function

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the use of hash functions in a hash-then-sign signature scheme

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly