Week 2 - Public Key Cryptography Flashcards

1
Q

What is the key distribution problem?

A

trying to agree on shared key over an insecure network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some solutions to the Key distribution problem?

A

1/ Diffie Hellman key exchange algorithm
2. Public key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the properties of public keys?

A
  • Each entity has their own private and public key
  • Data is encrypted with private key and decrypted with a corresponding public key
  • mathematically impossible to get the private key from the public key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does public key cryptography provide authenticity?

A

sender encrypts a message with their private key, allowing anyone with the senders public key to decrypt it, verifying it is them

also ensures sender cannot deny creating message, as only their private key could have signed it (Non repudiation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is Confidentiality and Authenticity achieved?

A

Layered Encryption

1st, encrypt message with bob’s private key (authenticity)

2nd, encrypt it with receivers public key, (confidentiality)

receiver decrypts with their private key and senders public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why might an entity have multiple key pairs?

A

single session communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What should be done if a key pair is compromised or lost?

A

revoke key and generate new key pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly