CHAPTER 9 / PUBLIC-KEY CRYPTOGRAPHY AND RSA

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

Asymmetric encryption utilizes only a public key for encryption and decryption.

false

2
New cards

Asymmetric encryption can be used for confidentiality but not for authentication.

false

3
New cards

Asymmetric encryption transforms plaintext into ciphertext.

true

4
New cards

Plaintext is transformed into ciphertext using two keys and a decryption algorithm.

false

5
New cards

A major advance in symmetric cryptography occurred with the development of the rotor encryption/decryption machine

true

6
New cards

Public-key encryption is more secure from cryptanalysis than symmetric encryption.

false

7
New cards

Much of the theory of public-key cryptosystems is based on number theory.

true

8
New cards

Asymmetric algorithms rely on one key for encryption and a different but related key for decryption.

True

9
New cards

The encryption algorithm performs various transformation on the ciphertext.

false

10
New cards

If the authenticator is encrypted with the sender's private key, it serves as a signature that verifies origin, content, and sequencing.

true

11
New cards

A trap-door one-way function is easy to calculate in one direction and infeasible to calculate in the other direction unless certain additional information is known.

true

12
New cards

A public-key encryption scheme is not vulnerable to a brute-force attack.

false

13
New cards

Before the application of the public-key cryptosystem each participant must generate a pair of keys.

true

14
New cards

The defense against the brute-force approach for RSA is to use a large key space.

true

15
New cards

Timing attacks are ciphertext attacks that are only applicable to RSA.

false

16
New cards

Asymmetric encryption is also known as ___ .

Public-key encryption

17
New cards

Public-key encryption is also known as ___ .

asymmetrical encryption

18
New cards

Asymmetric encryption can be used for __ .

both confidentiality and authentication

19
New cards

Plaintext is recovered from the ciphertext using the paired key and a _ .

decryption algorithm

20
New cards

The most widely used public-key cryptosystem is __ .

RSA

21
New cards

Public-key algorithms are based on __ .

mathematical functions

22
New cards

__ are two related keys, a public key and a private key that are used to perform complementary operations, such as encryption and decryption or signature generation and signature verification.

asymmetric keys

23
New cards

The __ indicates that the subscriber identified in the certificate has sole control and access to the private key.

Public Key Certificate

24
New cards

A __ is a cryptographic algorithm that uses two related keys, a public key and a private key. The two keys have the property that deriving the private key from the public key is computationally infeasible.

Public Key (Asymmetric) Cryptographic Algorithm

25
New cards

A public-key encryption scheme has __ ingredients.

six

26
New cards

The key used in symmetric encryption is referred to as a __ key.

secret

27
New cards

The readable message or data that is fed into the algorithm as input is the .

plaintext

28
New cards

Two issues to consider with the computation required to use RSA are encryption/decryption and __ .

key generation

29
New cards

__ depend on the running time of the decryption algorithm.

timing attacks

30
New cards

We define the ___ of an algorithm to be f(n) if, for all n and all inputs of length n the execution of the algorithm takes at most f(n) steps. This is a common measure of the efficiency of an algorithm.

time complexity

31
New cards

__ encryption is a form of cryptosystem in which encryption and decryption are performed using a public key and a private key.

Asymmetric

32
New cards

A __ is when two sides cooperate to exchange a session key.

key exchange

33
New cards

Asymmetric encryption transforms plaintext into __ using one of two keys and an encryption algorithm.

ciphertext

34
New cards

The difficulty of attacking __ is based on the difficulty of finding the prime factors of a composite number.

RSA

35
New cards

Public-key cryptography is asymmetric, involving the use of two separate keys, in contrast to ___ encryption, which uses only one key.

symmetric

36
New cards

A __ is a digital document issued and digitally signed by the private key of a Certification Authority that binds the name of a subscriber to a public key.

public key certificate

37
New cards

The __ is a set of policies, processes, server platforms, software and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.

Public Key Infrastructure (PKI)

38
New cards

The scrambled message produced as output is the __ . It depends on the plaintext and the key.

Ciphertext

39
New cards

A __ is one that maps a domain into a range such that every function value has a unique inverse, with the condition that the calculation of the function is easy, whereas the calculation of the inverse is infeasible.

trap door one-way function

40
New cards

"The sender "signs" a message with its private key. Signing is achieved by a cryptographic algorithm applied to the message or to a small block of data that is a function of the message," is a description of a ___ .

digital signature

41
New cards

The __ scheme is a block cipher in which the plaintext and ciphertext are integers between 0 and n - 1 for some n.

RSA

42
New cards

A single algorithm that will calculate the greatest common divisor (gcd) of two integers and, if the gcd is 1, determine the inverse of one of the integers modulo the other, is the __ algorithm.

Euclid

43
New cards

Five possible approaches to attacking the RSA algorithm are: brute force, mathematical attacks, hardware fault-based attacks, chosen ciphertext attacks, and ___.

timing attacks

44
New cards

A __ is an attack in which the adversary chooses a number of ciphertexts and is then given the corresponding plaintexts, decrypted with the target's private key.

chosen ciphertext attack

45
New cards

To counter attacks such as CCAs, RSA Security, Inc. recommends modifying the plaintext using a procedure known as ___ .

optimal asymmetric encryption padding (OAEP)