Asymmetric Encryption

Descripción

Bachelors Degree (Computer Security) Computer Science Fichas sobre Asymmetric Encryption, creado por Alex Neves el 21/05/2016.
Alex Neves
Fichas por Alex Neves, actualizado hace más de 1 año
Alex Neves
Creado por Alex Neves hace más de 8 años
14
1

Resumen del Recurso

Pregunta Respuesta
Briefly describe Public-key Encryption Two keys, one public one private. Infeasible to calculate private key from a public key. Security achieved through intractable mathematical problems.
What is Public-key Encryption used for? Symmetric key exchange and sender verification
5 differences between symmetric and asymmetric encryption 1 vs 2 key. Small vs large key size. Fast vs slow. Long term comms vs key exchange / verification. SP Networks vs Mathematical problems
State the 3 mathematical principles used in asymmetric cryptology - Large (typically prime) numbers - Modular arithmetic - Integer factorisation
What is the congruence relation? a === b (mod n) => a (mod n) = b (mod n)
Give the eqivalences of modular arithmetic ((a mod n) + (b mod n)) mod n = (a + b) mod n
What is a discrete logarithm? Draw the expression Combining logs with modular arithmetic. Hard to compute and requires brute force.
What is a primitive root? A generator for a prime P which, when raised to an exponent and modular P, produces all values between 0 and P-1
What is DHKEX? Diffie-Hellman Key Exchange. Exchanges symmetric keys in private using discrete logarithms.
Describe the 5 steps of DHKEX <See notes>
Why is DHKEX secure? Draw equation to be solved Symmetric key g^ab can only be solved by knowing either private exponents, a or b.
What is DHKEX vulnerable to? Man-in-the-middle attacks. Intercept initial comms and create two separate key exchanges between A and B.
Describe the Logjam attack. 512-bit DH attack. Number field sieve to precompute 3/4 stages of DH for a given prime. Final stage computed at attack time. Works since same primes are often used (Oakley Group 2)
What is PFS? Perfect forward secrecy. Establish a new symmetric key each session. Known as Ephemeral Mode in practice.
What is Elliptic Curve? An alternative to modular arithmetic and discrete logs. Uses a curve to decide key in the form of y^2 = x^3 + ax + b. Stronger than other methods for the same key size
Mostrar resumen completo Ocultar resumen completo

Similar

Computing Hardware - CPU and Memory
ollietablet123
SFDC App Builder 2
Parker Webb-Mitchell
Data Types
Jacob Sedore
Intake7 BIM L1
Stanley Chia
Software Processes
Nurul Aiman Abdu
Design Patterns
Erica Solum
CCNA Answers – CCNA Exam
Abdul Demir
Abstraction
Shannon Anderson-Rush
Spyware
Sam2
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Data Analytics
anelvr