• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/12

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

12 Cards in this Set

  • Front
  • Back

What are the two main advantages of public key cryptography compared with symmetric techniques?

1) In asymmetric encryption, there is no secret channel necessary for the exchange of the public key



2) Asymmetric ciphers creates lesser-key management problems than symmetric ciphers

What are the two limitations of public key cryptography compared with symmetric techniques?

1) Asymmetric ciphers takes about 1000 times more CPU time to process an asymmetric encryption or decryption than a symmetric encryption or decryption



2) Data can only be encrypted using the public key and only decrypted using the private key

Using an example, explain both of the major limitations of symmetric encryption

1) Key Distribution Problem - How do we reach a point where both parties have the same key



2) Not suitable for authentication since receiver can forge message and claim it came from the sender

Many communications systems use a combination of public key encryption and symmetric encryption. Why is this the case and how does it work?

This type of hybrid cryptosystem takes advantage of the convenience of asymmetric encryption and the efficiency of symmetric encryption.



Symmetric encryption is efficient but does not provide a convenient way of sharing a key.



Asymmetric encryption in the other hand provides a convenient key sharing mechanism but encryption is not as efficient as symmetric encryption.



Thus by using symmetric encryption to encrypt only the session key and asymmetric encryption for the rest of the communication, this hybrid cryptosystem leverage the best of both encryption methods

If two numbers are relatively prime, what does this mean? Give an example.

Two numbers a,b are relatively prime if they have no common divisors apart from 1

If x is a "primitive root" of y, what does this mean

This means that


x mod y, x^2 mod y^2, x^n mod y^n


has the set of numbers in {0,1,...,q-1} that are relatively prime to q

What is the discrete logarithm problem?

The inverse problem to exponentiation is to find x such that y = g^x (mod p)

Explain why the security of RSA depends on the difficulty of factoring large numbers

RSA uses the large number obtained from factorizing as part of its public key. Therefore the private key of RSA are the two prime numbers specified which only the owner should know. The public key should be difficult to break hence the need for the difficulty of factoring large numbers

What is the purpose of the Diffie-Hellmann public key technique? Briefly describe it

A public key technique for exchanging secret keys.



The secret key is calculated by both parties.



Requires some global public parameters



Based on difficulty in solving for x where a = b^x (mod c) ... a,b,c are known

Briefly outline ElGamal encryption

An asymmetric key encryption algorithm for public-key crytography which is based on the Diffie-Hellman key exchange.

Give a reason why Elliptic Curve Cryptography is sometimes chosen for use instead of RSA

RSA uses integer or polynomial arithmetic with very large numbers/polynomials. This imposes a significant load in storing and processing keys and messages.



ECC however offers the same security as RSA with smaller bit sizes and lower processing and memory overhead.

Discuss the significance of key size in cryptography? In your answer, comment on both symmetric and public key encryption

Key length is directly proportional to security. In modern cryptosystems, key length is measured in bits and each bit of a key increases the difficulty of a brute-force attack exponentially.



Public key encryption requires rather long keys around 1024 bits whereas symmetric encryptions, both block and stream, are able to use shorter keys around 256 bits.