Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
16 Cards in this Set
- Front
- Back
. Secrecy Protocols (conventional, public key)
|
Alice encrypts a message, M with K(A,B)
•Alice transmits MK(AB) •Only Bob is able to read M because only Bob (and Alice) have K(A,B) |
|
Integrity Protocols (conventional, public key)
|
1. Automated detection means that the receiving system must perform a comparison operation between 2 items
2.Preventing intentional modifications means that at least one of the received items must be protected by some type of cryptography |
|
Authenticity Protocols (conventional, public key)
|
The value H(M)Alice-priis generally called Alice’s digital signature of M
•When a digital signature verifies it guarantees the authenticity and integrity of the messageMH(M)Alice-pri |
|
Non-Repudiation Protocols
|
Require a digital signature. Give a judge the message, public key, and digital signature.
|
|
Hybrid encryption scheme
|
Using Public Cryptography to Distribute Conventional Keys
The hybrid encryption scheme is commonly used in: –encrypted SMIME e-mail –PGP encrypted e-mail –secure web protocols like SSL |
|
Digital Signature
|
A hash value that has been encrypted with the sender’s private key.
The act of signing means encrypting the message’s hash value with a private key. |
|
Encrypted
|
Provides confidentiality
|
|
Hashed
|
Provides integrity
|
|
Digitally Signed
|
: Authentification, nonrepudiation, and integrity
|
|
Encrypted and Digitally Signed
|
Confidentiality, Authentification, nonrepudiation, and integrity
|
|
Protocols
|
A sequence of steps taken by two or more parties to accomplish some task
–Established in advance –Mutually subscribed –Complete and unambiguous: a specific action for every possible situation |
|
Using Public Cryptography to Distribute a Conventional Key
|
The essence is:
–Distribute the easy key (a Public Key) –Encrypt the short data (the Conventional Key) with the slow crypto (Public Key Crypto) –Encrypt the long data (the message) with the fast crypto (Conventional Crypto) |
|
The Hybrid Scheme
|
The sender steps are:
–Randomly create a Conventional Key –Encrypt it with the Public Key of the recipient –Send the encrypted Conventional Key to the recipient –Encrypt the message with the Conventional Key –Send the encrypted message to the recipient |
|
Advantages of the Hybrid Scheme
|
It uses the speed of Conventional encryption
•It uses the ease of Public Key distribution •The session key is only used once so there is no chance for an attacker to gather a lot of ciphertext encrypted with the same Conventional key |
|
How many seconds does it take to encrypt a million (106) bit message using just the Public Key cipher?
|
1 million / 1000 = 1000 seconds or 20 minutes
|
|
How many seconds does the hybrid scheme take to encrypt the 1,000-bit Conventional session key? ________
•How many seconds does the hybrid scheme take to encrypt the 106-bit message? _______ •How many total seconds do both encryption steps take? ________ |
2 seconds
|