2.3: Public Key Encryption and Decryption

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

Key Pair

Consists of:

  • Encryption Public Key (ea)

  • Decryption Private Key (da)

2
New cards

Public Key

Can be publicized as belonging to the owner

3
New cards

Private Key

Should be kept secret and shared with no one

4
New cards

Sending a Message Process (Public Key Encryption)

  1. Obtain the receiver’s public key er

  2. Parameterize the Public Key Encryption Algorithm E with er

  3. Encrypt m to get c, Send c

  4. Recover m using corresponding Public Key Decryption Algorithm D parameterized by private key dr

5
New cards

What is required for Message Encryption?

Receiver’s public key is needed to encrypt the message

6
New cards

Ciphertext Decryption

Receiver uses their private key to decrypt the ciphertext to receive message

7
New cards

Public Key Integrity

Critical because if A could replace B’s public key with their own, anyone who thought they were encrypting plaintext for B with B’s public key would instead be making the plaintext recoverable by A

8
New cards

Symmetric Key Distribution

For group of n users, each pair should use a different symmetric key. About (n choose 2) keys, ~O(n2) keys

9
New cards

Public Key Distribution

For group of n users, each user only needs one key pair to allow others to encrypt for them. Requires only n keys total.

10
New cards

Hybrid Encryption

Combines the strengths of asymmetric (public key) and symmetric encryption to provide both security and efficiency

Symmetric is typically faster but Public is convenient for establishing shared secret keys between endpoints

11
New cards

Hybrid Encryption Process

  1. Random symmetric key (k) is used to encrypt the message

  2. k is then encrypted using the recipient public key

12
New cards

RSA Encryption

Primarily used to encrypt relatively short data keys or session keys for key management rather than the message itself

Form of public key encryption/decryption