Public Key Encryption Flashcards

1
Q

what keys are required for public key encryption?

A

a public and private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give two examples of one-way functions (2)

A
  1. computing the product of two large primes
  2. modular exponentiation with a large prime modulus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a trapdoor one-way function?

A

a function that is very easy to compute for every input, but very difficult to “invert” for a given output without a secret trapdoor, however, easy to invert given a secret trapdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What algorithms are used in public key encryption? (2)

A

RSA & El Gamal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which numbers form the RSA public key

A

n and e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What algorithm is used to compute d?

A

Extended Euclidean algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what two properties of RSA make it secure?

A
  1. computational impossibility of decrypting a ciphertext without knowledge of private key
  2. computational impossibility of determining the private key directly from the public key (need p & q which secret or need to factor n into its prime factors p & q)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

deterministic encryption is susceptible to which type of attack?

A

an informed exhaustive plaintext search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is hybrid encryption?

A

a cryptographic technique in which the strengths of symmetric key encryption (efficient and simplicity) and public key encryption (ease of key sharing) are combined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why do long plaintexts cause security issues for public key encryption?

A

To encrypt a longer plaintext, we would have to split the plaintext into separate blocks and then encrypt them separately (public key equivalent of ECB mode) which is not desirable due to deterministic encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Disadvantages of RSA (2)

A
  1. Large computational costs due to expensive encryption and decryption computations
  2. Not suitable for long plaintexts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does hybrid encryption work? (5)

A
  1. The sender generates a symmetric key and encrypts plaintext using this key
  2. The sender encrypts the symmetric key using the recipient’s public key
  3. Sender sends both the encrypted plaintext and the encrypted symmetric key
  4. Recipient uses their private key to decrypt the encrypted symmetric key
  5. Recipient uses the decrypted symmetric key to decrypt the ciphertext containing the plaintext message
  6. The symmetric key can be used for subsequent messages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly