Module 3- Number Theory and Asymmetric Crypography Flashcards

1
Q

AKA public key cryptography.

Uses a public and a private key.

A

Asymmetric Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Denotes the natural numbers. 1, 2, 3, etc.

A

N

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Denotes the integers. These are whole numbers -1, 0, 1, 2 etc.

A

Z

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Denotes the rational numbers (ratio of integers). Any number that can be expressed as a ratio of two integers 3/2, 17/4, 1/5 etc.

A

Q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Denotes the real numbers. This includes the rational numbers as well as numbers that cannot be expressed as a ratio of two integers, for example √2

A

R

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Denotes imaginary numbers. These are numbers whose square is a negative. √-1 = 1i

A

i

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A measure of the uncertainty associated with a random variable

A

Entropy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Any number whose factors are 1 and itself. Example 2, 3, 5, 7, 11, 13, 17, 23

A

Prime Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If a random number N is selected, the chance of it being prime is approx. 1/ln(N), where ln(N) denotes the natural logarithm of N.

A

Prime Number Theorem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Uses a formula, Mn = 2n − 1 where n is a prime number, to generate primes. Works for 2, 3, 5, 7 but fails on 11 and on many other n values.

A

Mersenne Primes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A number that has no factors in common with another number. For example, 3 and 7 are this.

A

Co-prime Numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The number of positive integers less than or equal to n that are co-prime to n is called the * *** of n. For example the number 6; 4 and 5 are co-prime with 6. Therefore, ** **=2. Symbolized by ϕ(n). For a prime number p, ϕ(n) is always p-1.
Part of the RSA algorithm!

A

Euler’s Totient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Used in a number of cryptography algorithms. Simply divide A by N and return the remainder.

  • So 5 mod 2 = 1
  • So 12 mod 5 = 2
  • Sometimes symbolized as % as in 5 % 2 = 1
A

Modulus Operator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Named after Leonardo of Pisa who was also known a *******. Sequence of numbers are derived by adding the last two numbers to create the next number, N1 + N2 = n3. Example, 0, 1, 1, 2, 3, 5, 8, 13, 21, 35, 56. Some random number generators use this.

A

Fibonacci Numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The number of people you would have to invite to a party so that two will have the same birthday (with high probability). √365
You need √N to have a high probability of collision.
Answer is approximately 1.174 √365 to have a high probability of collision.

A

Birthday Theorem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The number of people you need to have a high likelihood that two share the same birthday. The answer is 23. This is a classic math problem that relates to hashes.

A

Birthday Paradox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name used to refer to a class of brute force attacks against hashes. Attempts to find a collision.

A

Birthday Attack

18
Q

random number generator is most often used in cryptography and produces a pseudo random number.

A

-Algorithmic (software)

19
Q

The three types of random number generators

A
  • Table look-up
  • Hardware
  • Algorithmic (software)
20
Q

A sequence of random numbers with a low probability of containing identical consecutive elements.

A

K1

21
Q

A sequence of numbers which is indistinguishable from true random according to statistical tests.

A

K2

22
Q

It should be impossible for an attacker to calculate any previous or future values.

A

K3

23
Q

It should be impossible for an attacker to calculate or guess from an inner state of the generator any previous numbers in the sequence or any previous inner generator states.

A

K4

24
Q

Traits of a good Pseudorandom Number Generator (PRNG)

A

Uncorrelated sequences

Long period

25
Q

Created in 1997 by Moni Naor and Omer Reingold. The mathematics of this function are complex for non-mathematicians.

A

Naor-Reingold pseudorandom function

26
Q

Originally not suitable for cryptography but permutations of it are. Created by Makoto Matsumoto and Takuji Nishimura. Has a very large period, greater than many other generators.

A

Mersenne Twistter pseudorandom function

27
Q

Determined by the following four integer values:
m the modulus m>0
a the multiplier 0, 0

A

Linear Congruential Generator

28
Q

Created by D. H. Lehmer. It is a classic example of a Linear congruential generator. A PRNG type of linear congruential generator (LCG) that operates in multiplicative group of integers modulo n.
The basic algorithm is Xi+1=(aXi + c) mod m, with 0 ≤ Xi ≤ m

A

Lehmer Random Number Generator

29
Q

A type of pseudorandom number generator. If addition is used, then it is an ALFG. If multiplication is used then it is a MLFG. If XOR is used it is called a two-gap generalized feedback shift register, or GFS.

A

Lagged Fibonacci Generator

30
Q

Created in 1986 by Lenore Blum, Manuel Blum, and Michael Shub. Format is Xn+1 = Xn2 Mod M
The main difficulty of predicting the output of this is the difficulty of the “quadratic residuosity problem”. As difficult as breaking the RSA public-key cryptosystem.

A

Blum Blum Shub

31
Q

Algorith that was created by Bruce Schneier, John Kelsey, and Niels Ferguson. No longer recommended, Fortuna is recommended instead. Consists of four parts:

  • Entropy Accumulator
  • Generation Mechanism
  • Reseed Mechanism
  • Reseed Control
A

Yarrow

32
Q

A group of PRNGs that has many options for whoever implements the algorithm. Consists of three parts:

  • A generator
  • An entropy accumulator
  • A seed file
A

Fortuna

33
Q

A cryptographic protocol that allows two parties to establish a shared key over an insecure channel. Released in 1976, developed earlier by British Intelligence Service. Used for the exchange of symmetric keys.

A

Diffie-Hellman

34
Q

Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.

A

RSA

35
Q

A protocol for key aggreement based on Diffie-Hellman. Created in 1995. Incorporated into the public key standard IEEE P1363.

A

Menezes-Qu-Vanstone (MQV)

36
Q

Filed July 26, 1991 under U.S. Patent 5,231,668. Adopted by the U.S. Government in 1993 with FIPS186.
Choose a hash function (traditionally SHA1). Select a key length L and N. Choose a prime number q that must be less than or equal to the hash output length. Choose a prime number p such that p-1 is a multiple of q. Choose g, this number must be a number whose multiplicitive order modulo is q. Choose a random number x, where 0

A

Digital Signature Algorithm (DSA)

37
Q

Let H be the hashing function and m the message. Generate a random value for each message k where 0

A

Signing with DSA

38
Q

Created in 1985 by Victor Miller, IBM. Endorsed by the NSA, schemes based on it for Suite B. Protects information classified up to top secret with 384bit keys. Based on y2 = x3 + Ax + B.

A

Elliptic Curve

39
Q

Elliptic Curve Variations

A
  • Elliptic Curve Diffe-Hellman (used for key exchange)
  • Elliptic Curve Digital Signature Algorith (ECDSA)
  • Elliptic Curve MQV key agreement protocol
40
Q

Created in 1984 by Taher ***. Used in some PGP implementations as well as GNU Privacy Guard software. Consists of three parts: key generator, encryption algorithm, decryption algorithm. This encryption is probabilistic.

A

ElGamal