06-Public Key Encryption

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

Public-Key Cryptography

A cryptographic approach that uses a pair of private and public keys, allowing secure communication between parties without a shared secret.

2
New cards

RSA Encryption

A public-key encryption algorithm developed in 1977 by Rivest, Shamir, and Adleman, widely used for secure communication.

3
New cards

ElGamal Encryption

An encryption scheme based on the Diffie-Hellman key exchange algorithm, providing a method for secure communication.

4
New cards

Elliptic Curve Cryptography

A type of public-key cryptography that uses the algebraic structure of elliptic curves to secure communication and transactions.

5
New cards

Passive Attack

An attack that attempts to learn or use information from a system without affecting system resources.

6
New cards

Active Attack

An attack that attempts to alter system resources or affect their operation.

7
New cards

Key Exchange

The process of securely exchanging secret keys between endpoints for secure communication.

8
New cards

Symmetric Key Encryption

Encryption where the sender and receiver share a secret key for encrypting and decrypting messages.

9
New cards

Public-Key Encryption Scheme

A system consisting of key generation, encryption, and decryption algorithms for secure communication using public and private keys.

10
New cards

Symmetric vs

A comparison between symmetric and asymmetric encryption methods based on key generation, key size, and performance.

11
New cards

RSA Mathematical Background

Concepts related to prime numbers, greatest common divisors, and the integer factorization problem in the context of RSA encryption.

12
New cards

Totient Function

A function denoted by φ(n) that calculates the number of relative prime numbers less than a given integer n.

13
New cards

RSA Key Generation

The process of generating public and private key pairs for RSA encryption, involving prime number selection and calculation of key components.

14
New cards

Example

A step-by-step illustration of RSA key generation using prime numbers, totient calculation, and selection of public and private keys.

15
New cards

RSA Encryption

A method of encrypting and decrypting data using a public-private key pair, where the encryption is done using the public key and decryption using the private key.

16
New cards

Euler’s Theorem

A theorem stating that if 'a' and 'n' are relatively prime, then 'a' raised to the power of Euler's totient function of 'n' is congruent to 1 modulo 'n'.

17
New cards

Public Key

A key used for encryption in asymmetric cryptography, shared publicly.

18
New cards

Private Key

A key used for decryption in asymmetric cryptography, kept private.

19
New cards

Diffie-Hellman

A key exchange protocol that allows two parties to establish a shared secret over an insecure channel.

20
New cards

Semi-Prime Numbers

Numbers that are the product of two prime numbers, often used in RSA encryption for the modulus.

21
New cards

Discrete Logarithm Problem

In ElGamal encryption, the challenge of finding an exponent when given a base, result, and modulus.

22
New cards

Primitive Root modulo n

A number 'g' that is a generator of the multiplicative group of integers modulo 'n'.

23
New cards
24
New cards
25
New cards
26
New cards
27
New cards