Define RSA.
A public-key cryptosystem that uses the mathematical properties of large prime numbers.
True or false: AES is a symmetric encryption algorithm.
TRUE
AES stands for Advanced Encryption Standard and uses the same key for encryption and decryption.
What does ECC stand for?
Elliptic Curve Cryptography
Define symmetric encryption.
An encryption method where the same key is used for both encryption and decryption.
What is the main advantage of RSA?
It enables secure key exchange without needing to share a private key.
True or false: AES can use key sizes of 128, 192, or 256 bits.
TRUE
What is a key feature of elliptic curves?
They provide strong security with smaller key sizes compared to traditional methods.
What is the purpose of digital signatures?
To verify the authenticity and integrity of a message or document.
Fill in the blank: SHA stands for _______.
Secure Hash Algorithm
What is the role of a nonce in cryptography?
To ensure that old communications cannot be reused in replay attacks.
What is the function of a hash function?
To convert data into a fixed-size string of characters, which is typically a hash.
What is a salt in cryptography?
Random data added to passwords before hashing to prevent attacks.
Fill in the blank: HMAC stands for _______.
Hash-based Message Authentication Code
¿Qué algoritmos criptográficos utiliza el modo GCM y qué servicio ofrece cada uno?
Pasos para Descifrar con el Teorema Chino del Resto (CRT)
p, q = prime numbres
n = pq; e -> rand$, d = e^-1
y = ciphertext
1. yp = y mod p, yq = y mod q
2. dp = d mod (p-1), dq = d mod(q-1)
3. xp = yp ^dp mod p, xq = yq ^dq mod q
4. cp = q^-1 mod p, cq = p^-1 mod q
x = qcpxp + pcq*xq
Pasos para Cifrar en RSA
c = m ^ e mod (n)
Pasos del Protocolo RSA para Acuerdo de Llaves (Key Exchange)
A y B negocian n
A genera clave simétrica k
A cifra k con la clave pública de B: c = k^eb mod n.
A envía c a B.
B descifra: k = c^db mod n.
Propósito de RSA-PSS
Esquema de firma digital con seguridad demostrable (en el modelo de random oracle), resistente a falsificación.
Pasos de la Firma con RSA-PSS
kpriv = k|message = M
* Codifica M: ENCODE(M) -> EM
* Convierte a entero: m = OS2IP(EM)
* Firma RSAP1: s = RSAP1(k,m)
* Conv. octetos: S = I2OSP(s,k)
Pasos de la Verificación con RSA-PSS
Kpub (e,n)| M | S
* Aplicar operación RSA con clave pública para recuperar EM.
* Aplicar la verificación de padding PSS.
* Comparar hash recuperado con hash del mensaje.
MAC KeyGen: Entrada/Salida
Entrada: parámetro de seguridad; Salida: clave k.
MAC TagGen: Entrada/Salida
MAC Verificación: Entrada/Salida
¿Cuándo se dice que un MAC está roto?
Cuando un adversario puede producir un par (m, t) válido sin conocer la clave, para un mensaje no consultado.