Cryptography Exam 2

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/32

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:35 AM on 4/20/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

33 Terms

1
New cards

Confidentiality

ensures secrecy of the message — only intended recipient can see contents

2
New cards

Integrity

ensures data has not been altered in an unauthorized manner since the time it was transmitted

3
New cards

Authentication


ensures message really comes from the stated sender

4
New cards

Non-repudiation

ensures a party cannot deny the validity of the message it creates

5
New cards

What security goals does symmetric key encryption and asymmetric key (public key) encryption provide

Only confidentiality

6
New cards

What provides integrity and authentication?

Message Authentication Codes and Digital Signatures

7
New cards

What provides integrity, authentication, and non-repudiation

Digital Signatures

8
New cards

How does RSA key gen work

Select 2 large primes p and q
n = p*q and Φ(n) = (p-1)(q-1)
Select a random integer e less than Φ(n) where gcd(e, Φ(n))=1
Compute d, where e*d = 1 (mod Φ(n)) → (d = e-1 mod Φ(n))

9
New cards

What is the RSA public key

(e, n)

10
New cards

What is the RSA private key

d

11
New cards

What is kept secret in RSA

p and q

12
New cards

How does RSA encyrption work

get recipient’s (n, e)
c = Me (mod n)

13
New cards

How does RSA decryption work

Given c, M = Cd (mod n)

14
New cards

What is Φ(n)

the number of relatively prime numbers to n

15
New cards

What is a cyclic group

The group has a generator g such that every h in the group can be written as h = gi for some int i (in mod n)

16
New cards

What is a discrete logarithmic function

Let p be prime, G is a cyclic group, g is generator of G. Every element a of G can be written as gk=a (mod p) for some integer k. k is the discrete logarithm of a to base g mod p
Can be defined for any cyclic group

17
New cards

The RSA Problem

given c, find m such that me = c (mod n) where e and n are defined in RSA settings
not solvable when n, p, q are very large
if adversary knows p and q they can use Euler phi function and calculate d such that d*e = 1 (mod Φ(n)) and break RSA

18
New cards

Small message space attack on RSA

encrypt all possible plaintexts until c is obtained

19
New cards

Solution to small message space attack

Salting: append random bitstring to plaintext before encryption

20
New cards

Common Modulus Attack on RSA

if two entities use the same n attacker can find m from c1 = me1 (mod n) and c2 = me2 (mod n)
gcd(e1, e2) = 1 → attacker finds u, v such that ue1 + ve2 = 1 and computes c1uc2v = m

21
New cards

Malleability attack on RSA

takes advantage of multiplicative property
attacker can transform c so that it is still valid upon decryption but is incorrect

22
New cards

What is semantic security

no partial info about plaintext can be obtained from ciphertext

23
New cards

What is ciphertext indistinguishability

Adversary unable to distinguish pairs of c based on plaintexts they encrypt

24
New cards

What is probabilistic encryption

to get semantic security, use randomness so that the same message is encrypted to different ciphertexts

25
New cards

Is textbook RSA IND-CPA secure

No

26
New cards

When is a scheme IND-CPA secure

if adversary winning the IND-CPA security game has probability with a negligible advantage over random guessing

27
New cards

What is a cryptographic hash function

takes a string as input and outputs fixed size string (smaller than input size)

many-to-one function so collisions are possible

28
New cards

Cost of semantic security in public key encryption

some expansion is necessary for semantic security

ciphertext must be larger than corresponding plaintext

padding scheme
Cost: requires extra random number generation and an XOR op for each bit

29
New cards

What is the discrete logarithm problem

you cannot find x from gx (mod p)

30
New cards

Advantages of public key encryption

better for key management - do not need secure channel to transmit secret keys + do not need O(n2) keys for n entities

31
New cards

Disadvantages of public key cryptography

slower than symmetric key

32
New cards

How does digital signature work

Sig = Spriv(M) and Vpub(M, Sig) should be “valid”

provides authentication, integrity, non-repudiation

33
New cards

What is Fermat’s Little Theorem

if p is prime and a is not a multiple of p (gcd(a, p) = 1) then ap-1 = 1 (mod p) and ap = a (mod p)