Public Key Crptography (week 10) Flashcards

(40 cards)

1
Q

What principle did William Stanley Jevons illustrate with his factorisation example?

A

The difficulty of reversing factorisation underpins RSA security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who invented the RSA algorithm?

A

Ron Rivest, Adi Shamir, and Leonard Adleman.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the key components required for RSA key generation?

A

Two large prime numbers (p, q) and a public/private key pair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does public key encryption ensure confidentiality?

A

The sender encrypts data with the recipient’s public key; only the recipient can decrypt it using their private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is non-repudiation in public key cryptography?

A

Proof that a message was sent by the claimed sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is encrypting the entire document often unnecessary in practice?

A

Encrypting a hash is faster and provides equivalent authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two processes combined for confidentiality and authentication?

A

Encrypting with the recipient’s public key and signing with the sender’s private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can Bob verify Linda’s identity using public key cryptography?

A

Using Linda’s public key to decrypt her signed message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Certificate Authority (CA)?

A

An entity that issues digital certificates to verify identities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What role does a Registration Authority (RA) play in public key infrastructure?

A

It verifies user requests before certificates are issued.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Web of Trust model?

A

A decentralized method where users vouch for each other’s keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is the Web of Trust difficult to manage in practice?

A

Trust chains can be complex and difficult to maintain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the primary role of Pretty Good Privacy (PGP)?

A

Encrypting and signing emails for privacy and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does the Estonian ID-Card model ensure public key verification?

A

Through government-backed digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the key properties of cryptographic hash functions?

A

Deterministic, fast, irreversible, and collision-resistant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is MD5 considered flawed for modern security purposes?

A

It is vulnerable to collision attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What hash algorithm is recommended for modern applications?

A

SHA-256 or SHA-3.

18
Q

How does Linux secure passwords using hashing and salts?

A

By combining a password with a unique salt before hashing.

19
Q

What is the purpose of a Message Authentication Code (MAC)?

A

To ensure data integrity and authenticity.

20
Q

How does a Digital Signature ensure message authenticity?

A

By signing the message with the sender’s private key.

21
Q

What is the Diffie-Hellman key exchange?

A

A method for securely exchanging cryptographic keys.

22
Q

Why is public key cryptography not used for real-time encryption?

A

It is slower than symmetric encryption methods.

23
Q

What vulnerability exists in the Diffie-Hellman exchange?

A

Man-in-the-middle attacks if authentication isn’t applied.

24
Q

How can you mitigate a man-in-the-middle (MITM) attack in Diffie-Hellman?

A

Use digital certificates to verify identity.

25
What does GSM stand for?
Global System for Mobile Communications.
26
What is the primary purpose of GSM encryption?
To protect voice and data transmission over mobile networks.
27
How does GSM encryption use XOR for secure communication?
By combining plaintext with a generated keystream.
28
What is the relationship between XOR and addition modulo 2?
They are mathematically identical.
29
Why does XOR provide better security than AND or OR in encryption?
XOR’s output reveals no direct information about the inputs.
30
How does GSM’s A5 stream cipher generate a key?
Using the session key (Kc) and frame number.
31
What is the role of the SIM card in GSM encryption?
It stores the secret key for generating Kc.
32
What is the significance of the session key (Kc) in GSM encryption?
It is unique for each communication session.
33
Why is the A5/1 cipher considered vulnerable?
It can be cracked using rainbow tables and brute force.
34
What encryption algorithms replaced A5/1 in later generations of mobile communication?
A5/3, Kasumi, and AES.
35
What are the key differences between 3G, 4G, and 5G encryption methods?
Each iteration improved encryption strength and added enhanced authentication methods.
36
How does AES improve security in modern mobile communication?
With stronger encryption keys and improved performance.
37
What is the role of a pseudo-random key stream in GSM encryption?
It ensures data appears random to attackers.
38
Why is XOR encryption reversible using the same XOR operation?
XORing twice with the same key cancels out the original encryption.
39
What property makes XOR ideal for encryption?
Its ability to easily encrypt and decrypt data by repeating the same process.
40
What logic gate does XOR resemble?
The exclusive OR (XOR) gate in digital logic.