Week 9 Flashcards

1
Q

What are Cryptographic communications?

A
  • Throughout history there’s often been the need to securely transmit information through insecure channels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the general idea behind encryption schemes?

A
  • A message M (the plaintext) is to be sent is encrypted before transmission into an unrecognisable string of characters C
  • the ciphertext C is then trasmitted to the recipient who uses a key to decrypt C to recover the original plaintext M
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is symmetric key encryption

A
  • This is where the sender and receiver use the same key as each other to both encrypt and decrypt messages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are substitution ciphers?

A
  • they use symmetric encryption
  • the key is a permutation of the alphabet
  • so each letter in the plaintext is replaced by another letter or a number
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Caesar cipher

A

Also known as a shift ciphers
- since we just shift the letters in the alphabet by a certain number
- so if the key = 3, a is now x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why don’t we use substitution ciphers?

A
  • they are not secure as they can be easily broken using frequency analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a one time pad?

A
  • secure symmetric ciphers do exist - such as the one time pad
  • for this encryption scheme, the sender and recipient share a random bit string K (a series of 0’s and 1’s) that’s randomly generate and is as long as any message that they are going to send
  • this key k is the symmetric key that is used for the encryption/decryption process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is encryption achieved using a one time pad:

A
  • to encrypt the message M, alice computes C = M XOR K
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the problem with symmetric key encryption and how can we securely distribute keys?

A

The problem is symmetric key distribution is not anywhere near as secure as asymmetric encryption but asymmetric encryption is extremely space and time consuming
- so the compromise is to exchange the shared key used for symmetric encryption using asymmetric encryption so that the shared key is computationally secure but then we can use symmetric encryption which is a lot less time consuming to send and decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a one way function?

A
  • Where E(D(M)) = M
  • It means that knowledge of the encryption method gives no information about the decryption scheme. Anyone can send an encrypted message to the holder of D but only that person can decrypt the cybertext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a digital signature?

A

It allows a recipient to verify that a message was truly sent by the sender that claims they sent it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the RSA encryption scheme use to ensure computational security?

A
  • uses difficulty of factoring large numbers and maths concepts, as it’s unknown how to do factoring of large numbers in polynomial time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the rule called of a divides b and b divides c meaning a also divides c?

A

Known as transitivity
- a|b and b|c so a|c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what does a|b and a|c mean for all integers i and j

A

a|(ib and jc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the greatest common divisor?

A
  • where a and b are positive integers, the GCD of a and b denotes GCD(a,b) is the largest integer that divides both a and b
  • if GCD(a,b) = 1 we say a and b are relatively prime
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can we apply the logic of the extended Euclidean algorithm to RSA?

A
  • In RSA we can publish the encryption function but using the extended Euclidean algorithm, only the recipient can
17
Q

Why is it so difficult to break RSA?

A
  • Because even knowing e doesn’t allow us to figure out d unless we know Φ(n)
  • and Φ(n) is not easily found if it’s a large number as factoring large numbers can’t be done in polynomial time
  • as the ability to factor large numbers improves, we simply just increase the size of p and q, so that p * q = n is bigger
18
Q

Why do digital signatures work?

A
  • A signature is applied to the message by doing S = M^d mod n, when alive gets the message she can check bob sent it by doing M = S^e mod n
  • since bob is the only one who knows the decryption function, this will verify bob sent M.
19
Q

What is fast exponentiation?

A
  • ## A method for calculating values raised to an exponent (power) - x^k