• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/16

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

16 Cards in this Set

  • Front
  • Back
. Secrecy Protocols (conventional, public key)
Alice encrypts a message, M with K(A,B)
•Alice transmits MK(AB)
•Only Bob is able to read M because only Bob (and Alice) have K(A,B)
Integrity Protocols (conventional, public key)
1. Automated detection means that the receiving system must perform a comparison operation between 2 items
2.Preventing intentional modifications means that at least one of the received items must be protected by some type of cryptography
Authenticity Protocols (conventional, public key)
The value H(M)Alice-priis generally called Alice’s digital signature of M
•When a digital signature verifies it guarantees the authenticity and integrity of the messageMH(M)Alice-pri
Non-Repudiation Protocols
Require a digital signature. Give a judge the message, public key, and digital signature.
Hybrid encryption scheme
Using Public Cryptography to Distribute Conventional Keys

The hybrid encryption scheme is commonly used in:
–encrypted SMIME e-mail
–PGP encrypted e-mail
–secure web protocols like SSL
Digital Signature
A hash value that has been encrypted with the sender’s private key.
The act of signing means encrypting the message’s hash value with a private key.
Encrypted
Provides confidentiality
Hashed
Provides integrity
Digitally Signed
: Authentification, nonrepudiation, and integrity
Encrypted and Digitally Signed
Confidentiality, Authentification, nonrepudiation, and integrity
Protocols
A sequence of steps taken by two or more parties to accomplish some task
–Established in advance
–Mutually subscribed
–Complete and unambiguous: a specific action for every possible situation
Using Public Cryptography to Distribute a Conventional Key
The essence is:
–Distribute the easy key (a Public Key)
–Encrypt the short data (the Conventional Key) with the slow crypto (Public Key Crypto)
–Encrypt the long data (the message) with the fast crypto (Conventional Crypto)
The Hybrid Scheme
The sender steps are:
–Randomly create a Conventional Key
–Encrypt it with the Public Key of the recipient
–Send the encrypted Conventional Key to the recipient
–Encrypt the message with the Conventional Key
–Send the encrypted message to the recipient
Advantages of the Hybrid Scheme
It uses the speed of Conventional encryption
•It uses the ease of Public Key distribution
•The session key is only used once so there is no chance for an attacker to gather a lot of ciphertext encrypted with the same Conventional key
How many seconds does it take to encrypt a million (106) bit message using just the Public Key cipher?
1 million / 1000 = 1000 seconds or 20 minutes
How many seconds does the hybrid scheme take to encrypt the 1,000-bit Conventional session key? ________
•How many seconds does the hybrid scheme take to encrypt the 106-bit message? _______
•How many total seconds do both encryption steps take? ________
2 seconds