Week 7 - Public Key Cryptography

Ace your homework & exams now with Quizwiz!

A Session Key Distribution Scheme (SKDS)

-Involves a trusted authority and two users - Alice and Bob who wish to communicate -Objective is the production of a sesison key known only to Alice and Bob (maybe the TA) -Session keys are used to encrypt information for a specified short period fo time -Often each network user will also share a different long lived key with the TA

What is a one way function

A function from X to Y so that for all x it is easy to compute f(x) but for all y it is computaitonally infeasible to find x such that f(x)=y. private key encryption does not provide a one way fucntion because if you know how to encrpyt you can know to decrypt. If you have they key then you can use it for both purposes.

A field

A ring where every element except additive identity 0 has an inverse

A group

A set where the binary operation * is defined so: - G is clsoed - Assocative -Identity -Inverse

A ring

A set with two operations + and . where following properties satisfied: -Abelina group wrt to + with an adiditve identiy 0 -R is clsoed for . and . is associative . is distibutive over + for example: x(y+z) = xy + xZ

A signature Scheme

Alice wants to authenticate/sign her message = she can just use here own decryption algorithm with her secret key to get y = y is the decryption under alices key of her message x. She then sends y and presumably the message x. Bob can apply the ecnryption side of the algorthm to y, and since theyre inverses, we get back the value x. He knows alice created the value y, since she is the only person who knew the secret key. Publicly verfiable.

Strong Primes

Defeats some of the basic factoring algo's but cant defeat the eliptic curve method

Public Key Crypto diagram

Doesnt depend on any secure channel. Bob tells Alice how to encrypt. He does so on an unsercure channel. But can derive decryption form that

Fermat's Little Theorem

For every integer a and every prime p, a^p = a mod p. This makes RSA work!

An Abelian Group

If oepration * is commuative x*y = y*x

Public Key Cryptosystem

Infeasible to derive the decryption from the encyrption function

Can a public key cryptosystem be unconditionally secure?

No because we have given away the encryption function. Always gives the possibility of breaking the cipher. Oscar can always launch a chosen plaintext attack because he has the encrytpion function.

Chinese remainder theorem

Suppose n1,n2,....,nk are integers which are pairwise relatively prime. Then for any integers a1, a2,...,ak, there is a solution x to the system of equations x ≡ a1 (mod n1) x≡ a2(mod n2)....... x≡ ak(mod nk) x = a1• N1•x1 + a2•N1•xd mod N where, N = n1•n2 N1= N/n1 N2=N/n2 x1= inverse of N1 mod n1 x2 = inverse of N2 mod n2

Trap-door one-way function

The trap door allows us to reverse the function. I.e. the decryption key. We wll want our trap door one way fucntions to be invertible.

General Purpose Algorithms

They have asymptotic runtimes

A key predistribution scheme (PKS)

Trsted authority distributes keying information in advance. Keyeing information is distributed using secure channels Keying information might be long lived keys or secret information that can later be used to produce keys


Related study sets

Chapter 15 - Intermediate Accounting MC

View Set

CSI101 chapter 1, CSI101 chapter 12, CSI101 chapter 9, CSI101 chapter 5, CSI101 chapter 7, CSI101 chapter 2, CSI101 chapter 6, CSI101 chapter 14, CSI101 chapter 8, CSI101 chapter 11, CSI101 chapter 3, CSI101 chapter 13, CSI101 chapter 10, CSI101 chap...

View Set

Ch. 10 Making Capital Investment Decisions

View Set

Math Unit 6, QUIZ 3: INDIRECT MEASURE

View Set

Learning Curve: 6a How Do We Learn? and Classical Conditioning

View Set

[Grade 10 Science: Physics] Chapter 10 Review

View Set

MRKT 239 Test 1 The impact of environmental forces on value can be extensive as market changes can easily influence how stakeholders perceive certain products.

View Set