Principles of Cryptography Flashcards

(19 cards)

1
Q

What is the key in a Caeser Cipher?

A

The number of times you need to shift the alphabet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Symmetric encryption?

A

The encryption and decryption happen using same key. Key is secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Symmetric encryption guarantee?

A

Confidentiality of the message being sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Asymmetric encryption?

A

The encryption and decryption happen with two different keys (I have two keys, one used to encrypt and one used to decrypt)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an example of Symmetric encryption?

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an issue with Asymmetric encryption?

A

A lot of work to create the keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetric Encryption (4 steps)

A

1) Alice encrypts message with Bob’s public key 2) Bob decrypts this with his private key 3) Bob encrypts with Alice’s public key 4) Alice decrypts with her private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 2 uses for Public Key encryption?

A

Symmetric key distribution, Digital Signatures (DSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are 2 ways of Public Key encryption?

A

RSA, DSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RSA Public Key Encryption (4 Steps)

A

1) Alice calculates a public key and a private key, 2) Bob sends a message to Alice, encrypting it with her public key, 3) Alice decrypts using her private key, 7) If they match up, the message has not been tampered with and Alice really did send it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DSA Public Key Encryption (7 Steps)

A

1) Alice calculates a hash of the message she wants to send, 2) She encrypts this with her own private key. This is her signature. 3) She takes (her signature + message) and encrypts it with Bob’s public key, 4) Bob decrypts with his private key, to get the message and Alice’s signature, 5) Bob decrypts Alice’s signature to get her hash, 6) He hashes the message he recieved, and compared it to the hash from Alice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What 3 things does DSA guarantee?

A

Integrity of message send, source authentication, non-repudiation (cannot pretend you didn’t send)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does DSA differ to Assymetric?

A

Asymmetric, you encrypt with the other person’s public. DSA, the signature itself is encrypted with your own signature. Asymmetric =
1) Encrypt with the other person’s public key
2) That person decrypts with their private key

DSA =
1) Encrypt your signature with your private key
2) That person decrypts with your public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are 2 ways of sharing shared secret keys in symmetric cryptography?

A

Public Key Cryptography, Diffie-Hellman key exchange protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 2 overall steps of Public Key Encryption?

A

1) Alice sends her public key to Bob 2) Bob sends back the shared key encrypted with Alice’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the issue with Public Key Encryption?

A

It’s susceptible to a Man in the Middle Attack, after step 1 someone could get Alice’s public key and replace it with their own, before sending to Bob

17
Q

Diffie Hellman Key Exchange

A

1) Alice and Bob each make a private and public key. 2) They share each other’s public key 3) alculate their shared private key using the public key given to them and their own private key.

18
Q

For the Diffie- Hellman key exchange protocol, what does its effectiveness depend on?

A

The difficulty that in computing discrete logarithms

19
Q

What is the issue with Diffie Hellman?

A

It’s susceptible to a Man in the Middle Attack, after step 2 someone could get Alice’s public key and replace it with their own, before sending to Bob. Same with intercepting Bob’s public key and putting in his own