06-Public Key Encryption

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 26

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

27 Terms

1

Public-Key Cryptography

A cryptographic approach that uses a pair of private and public keys, allowing secure communication between parties without a shared secret.

New cards
2

RSA Encryption

A public-key encryption algorithm developed in 1977 by Rivest, Shamir, and Adleman, widely used for secure communication.

New cards
3

ElGamal Encryption

An encryption scheme based on the Diffie-Hellman key exchange algorithm, providing a method for secure communication.

New cards
4

Elliptic Curve Cryptography

A type of public-key cryptography that uses the algebraic structure of elliptic curves to secure communication and transactions.

New cards
5

Passive Attack

An attack that attempts to learn or use information from a system without affecting system resources.

New cards
6

Active Attack

An attack that attempts to alter system resources or affect their operation.

New cards
7

Key Exchange

The process of securely exchanging secret keys between endpoints for secure communication.

New cards
8

Symmetric Key Encryption

Encryption where the sender and receiver share a secret key for encrypting and decrypting messages.

New cards
9

Public-Key Encryption Scheme

A system consisting of key generation, encryption, and decryption algorithms for secure communication using public and private keys.

New cards
10

Symmetric vs

A comparison between symmetric and asymmetric encryption methods based on key generation, key size, and performance.

New cards
11

RSA Mathematical Background

Concepts related to prime numbers, greatest common divisors, and the integer factorization problem in the context of RSA encryption.

New cards
12

Totient Function

A function denoted by φ(n) that calculates the number of relative prime numbers less than a given integer n.

New cards
13

RSA Key Generation

The process of generating public and private key pairs for RSA encryption, involving prime number selection and calculation of key components.

New cards
14

Example

A step-by-step illustration of RSA key generation using prime numbers, totient calculation, and selection of public and private keys.

New cards
15

RSA Encryption

A method of encrypting and decrypting data using a public-private key pair, where the encryption is done using the public key and decryption using the private key.

New cards
16

Euler’s Theorem

A theorem stating that if 'a' and 'n' are relatively prime, then 'a' raised to the power of Euler's totient function of 'n' is congruent to 1 modulo 'n'.

New cards
17

Public Key

A key used for encryption in asymmetric cryptography, shared publicly.

New cards
18

Private Key

A key used for decryption in asymmetric cryptography, kept private.

New cards
19

Diffie-Hellman

A key exchange protocol that allows two parties to establish a shared secret over an insecure channel.

New cards
20

Semi-Prime Numbers

Numbers that are the product of two prime numbers, often used in RSA encryption for the modulus.

New cards
21

Discrete Logarithm Problem

In ElGamal encryption, the challenge of finding an exponent when given a base, result, and modulus.

New cards
22

Primitive Root modulo n

A number 'g' that is a generator of the multiplicative group of integers modulo 'n'.

New cards
23
New cards
24
New cards
25
New cards
26
New cards
27
New cards

Explore top notes

note Note
studied byStudied by 14 people
1005 days ago
4.0(1)
note Note
studied byStudied by 162 people
624 days ago
5.0(1)
note Note
studied byStudied by 16 people
122 days ago
5.0(1)
note Note
studied byStudied by 22 people
743 days ago
5.0(1)
note Note
studied byStudied by 61 people
882 days ago
4.0(1)
note Note
studied byStudied by 8 people
176 days ago
5.0(1)
note Note
studied byStudied by 10 people
898 days ago
5.0(1)
note Note
studied byStudied by 255 people
686 days ago
4.8(9)

Explore top flashcards

flashcards Flashcard (127)
studied byStudied by 31 people
911 days ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 19 people
266 days ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 8 people
784 days ago
5.0(1)
flashcards Flashcard (28)
studied byStudied by 29 people
737 days ago
5.0(2)
flashcards Flashcard (67)
studied byStudied by 9 people
837 days ago
5.0(1)
flashcards Flashcard (315)
studied byStudied by 51 people
763 days ago
5.0(4)
flashcards Flashcard (29)
studied byStudied by 15 people
379 days ago
5.0(1)
flashcards Flashcard (26)
studied byStudied by 84 people
17 days ago
5.0(1)
robot