2.3 Symmetric and Asymmetric cryptography Flashcards
Symmetric system: needs two criterias:
(i) encryption and decryption are done using the same secret key
(ii) encryption and decryption functions are similar
The key must be exchanged between organizations.
Asymmetric cryptography
A pair of related __ are used (one public and one private). ____ functions are utilized to generate these pairs. It is not essential for the sender to have a ___ key but the receiver needs it to decrypt the message.
Asymmetric cryptography is often used to authenticate data using digital signatures.
keys
One-way
private
RSA-based signature schemes
1. Based on the assumption that the … multiplicated is very hard, but easy with additional information (so called trapdoor one-way-functions)
2. …, fast to verify
3. Not used in blockchains
- factorization of large prime number
- Long signatures and public keys
- Not used in blockchains
ECC-based signature schemes, such as ECDSA :
- Based on discrete logarithms
- Short signatures and public keys
- Used by Bitcoin and Ethereum (pre-merge)
BLS-based signature schemes :
- Short signatures, easily verifiable
- Aggregatable signatures (useful in blockchains as it saves space
- Supports threshold cryptography (i.e., encrypt with public key and distribute the fragments of the private key among multiple parties)
4.Used by Ethereum (post-merge)
Many signatures need a good source of __ otherwise private keys can be leaked. Digital signatures can only sign a ___; thanks to ___ signing the hash of the message is enough.
entropy
small amount of data
collision resistance