Week 7: Public-Key Cryptography Flashcards

1
Q

How do Merkle Puzzles work?

A
  1. Alice generate n puzzles, when one is solved it reveals an ID d and key k
  2. Alice sends puzzle set to Bob, he picks random puzzle i and solves it to get ki and di
  3. Bob then sends di to Alice and they both know to use key ki
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some applications of assymetric-key cryptography?

A
  • Key agreement/exchange (ie. DHE, ECDHE)

- Digital signatures (ie. RSA, DSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does Diffie-Hellman work?

A

Given common generator g,
Alice generates key a and sends g^a to Bob.
Bob generate key b and sends g^b to Alice.
Now both can generate g^ab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the weakness of Diffie-Hellman?

A

Susceptible to Man in Middle attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly