Week 2 - Public Key Cryptography Flashcards
What is the key distribution problem?
trying to agree on shared key over an insecure network
What are some solutions to the Key distribution problem?
1/ Diffie Hellman key exchange algorithm
2. Public key cryptography
What are the properties of public keys?
- Each entity has their own private and public key
- Data is encrypted with private key and decrypted with a corresponding public key
- mathematically impossible to get the private key from the public key
How does public key cryptography provide authenticity?
sender encrypts a message with their private key, allowing anyone with the senders public key to decrypt it, verifying it is them
also ensures sender cannot deny creating message, as only their private key could have signed it (Non repudiation)
How is Confidentiality and Authenticity achieved?
Layered Encryption
1st, encrypt message with bob’s private key (authenticity)
2nd, encrypt it with receivers public key, (confidentiality)
receiver decrypts with their private key and senders public key
Why might an entity have multiple key pairs?
single session communications
What should be done if a key pair is compromised or lost?
revoke key and generate new key pair