Week 7: Public-Key Cryptography Flashcards
1
Q
How do Merkle Puzzles work?
A
- Alice generate n puzzles, when one is solved it reveals an ID d and key k
- Alice sends puzzle set to Bob, he picks random puzzle i and solves it to get ki and di
- Bob then sends di to Alice and they both know to use key ki
2
Q
What are some applications of assymetric-key cryptography?
A
- Key agreement/exchange (ie. DHE, ECDHE)
- Digital signatures (ie. RSA, DSA)
3
Q
How does Diffie-Hellman work?
A
Given common generator g,
Alice generates key a and sends g^a to Bob.
Bob generate key b and sends g^b to Alice.
Now both can generate g^ab
4
Q
What is the weakness of Diffie-Hellman?
A
Susceptible to Man in Middle attacks.