Podcast
Questions and Answers
What is the diffie- hellman key exchange?
What is the diffie- hellman key exchange?
To exchange 2 separate keys securely using compute discrete logarithms. The key exchange algorithm using public and private values
How does the diffie-hellman key exchange work?
How does the diffie-hellman key exchange work?
Bob and alice agrees on two values, g and n. Then, generates a random number for both of them, x and y. Then, use the formula: Alice = g^x mod n, and Bob = g^y mod n. Then, exchange the values of Alice and Bob with each other. Then use the formula : Key1= Bob^x mod n
What are the principles of public key cryptography?
What are the principles of public key cryptography?
It uses two keys, public and private. Then, it uses clever number theoritic concepts to function which complements private key crypto instead of replacing it
Why is public-key cryptography used?
Why is public-key cryptography used?
Signup and view all the answers
What is the public key?
What is the public key?
Signup and view all the answers
What is the private key?
What is the private key?
Signup and view all the answers
What are the six ingredients in the public key cryptography principles scheme?
What are the six ingredients in the public key cryptography principles scheme?
Signup and view all the answers
Difference between authenticating and encrypting using public key cryptography?
Difference between authenticating and encrypting using public key cryptography?
Signup and view all the answers
What are the applications for public key cryptosystems?
What are the applications for public key cryptosystems?
Signup and view all the answers
What are the two cryptographic algorithms?
What are the two cryptographic algorithms?
Signup and view all the answers
In symmetric vs asymmetric, what is the difference between those two cryptography methods in terms of algorithm and keys?
In symmetric vs asymmetric, what is the difference between those two cryptography methods in terms of algorithm and keys?
Signup and view all the answers
In symmetric vs asymmetric, what is the difference between those two cryptography methods in terms of possession of the keys?
In symmetric vs asymmetric, what is the difference between those two cryptography methods in terms of possession of the keys?
Signup and view all the answers
In symmetric vs asymmetric, what is the difference between those two cryptography methods in terms of security?
In symmetric vs asymmetric, what is the difference between those two cryptography methods in terms of security?
Signup and view all the answers
Another cryptographic algorithm is called digital signature standard (DSS). What is that?
Another cryptographic algorithm is called digital signature standard (DSS). What is that?
Signup and view all the answers
Another cryptographic algorithm is called Elliptic-Curve Cryptography. What is that?
Another cryptographic algorithm is called Elliptic-Curve Cryptography. What is that?
Signup and view all the answers
What are the steps in public key certificate use?
What are the steps in public key certificate use?
Signup and view all the answers
What does message authentication specialise in?
What does message authentication specialise in?
Signup and view all the answers
What are the three alternative functions used in message authentication?
What are the three alternative functions used in message authentication?
Signup and view all the answers
What are the three approaches to message authentication?
What are the three approaches to message authentication?
Signup and view all the answers
What is one-way hash function?
What is one-way hash function?
Signup and view all the answers
What are the REASONS to AVOID encryption?
What are the REASONS to AVOID encryption?
Signup and view all the answers