Cripto Flashcards

(36 cards)

1
Q

Define RSA.

A

A public-key cryptosystem that uses the mathematical properties of large prime numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or false: AES is a symmetric encryption algorithm.

A

TRUE

AES stands for Advanced Encryption Standard and uses the same key for encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does ECC stand for?

A

Elliptic Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define symmetric encryption.

A

An encryption method where the same key is used for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the main advantage of RSA?

A

It enables secure key exchange without needing to share a private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or false: AES can use key sizes of 128, 192, or 256 bits.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a key feature of elliptic curves?

A

They provide strong security with smaller key sizes compared to traditional methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of digital signatures?

A

To verify the authenticity and integrity of a message or document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: SHA stands for _______.

A

Secure Hash Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the role of a nonce in cryptography?

A

To ensure that old communications cannot be reused in replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the function of a hash function?

A

To convert data into a fixed-size string of characters, which is typically a hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a salt in cryptography?

A

Random data added to passwords before hashing to prevent attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank: HMAC stands for _______.

A

Hash-based Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

¿Qué algoritmos criptográficos utiliza el modo GCM y qué servicio ofrece cada uno?

A
  • AES (CTR) → Confidencialidad
  • Multiplicación en el campo de Galois GF(2^128) → Autenticación (integridad y autenticidad).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pasos para Descifrar con el Teorema Chino del Resto (CRT)

A

p, q = prime numbres
n = pq; e -> rand$, d = e^-1
y = ciphertext
1. yp = y mod p, yq = y mod q
2. dp = d mod (p-1), dq = d mod(q-1)
3. xp = yp ^dp mod p, xq = yq ^dq mod q
4. cp = q^-1 mod p, cq = p^-1 mod q
x = q
cpxp + pcq*xq

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pasos para Cifrar en RSA

A

c = m ^ e mod (n)

17
Q

Pasos del Protocolo RSA para Acuerdo de Llaves (Key Exchange)

A

A y B negocian n
A genera clave simétrica k
A cifra k con la clave pública de B: c = k^eb mod n.
A envía c a B.
B descifra: k = c^db mod n.

18
Q

Propósito de RSA-PSS

A

Esquema de firma digital con seguridad demostrable (en el modelo de random oracle), resistente a falsificación.

19
Q

Pasos de la Firma con RSA-PSS

A

kpriv = k|message = M
* Codifica M: ENCODE(M) -> EM
* Convierte a entero: m = OS2IP(EM)
* Firma RSAP1: s = RSAP1(k,m)
* Conv. octetos: S = I2OSP(s,k)

20
Q

Pasos de la Verificación con RSA-PSS

A

Kpub (e,n)| M | S
* Aplicar operación RSA con clave pública para recuperar EM.
* Aplicar la verificación de padding PSS.
* Comparar hash recuperado con hash del mensaje.

21
Q

MAC KeyGen: Entrada/Salida

A

Entrada: parámetro de seguridad; Salida: clave k.

22
Q

MAC TagGen: Entrada/Salida

A
  • Entrada: k, m
  • Salida: tag = t.
23
Q

MAC Verificación: Entrada/Salida

A
  • Entrada: k, m, t
  • Salida: true, false.
24
Q

¿Cuándo se dice que un MAC está roto?

A

Cuando un adversario puede producir un par (m, t) válido sin conocer la clave, para un mensaje no consultado.

25
Uso de MAC/Criptografía en GSM
Autenticidad de la Entidad en la red
26
Pasos de Firma Digital usando ElGamal
* ke -> rand{0,...,p-2} * r = α ^ ke mod p; s = (m-d*r)ke^-1 mod (p-1) * sign ( r , s )
27
Pasos de Verificación de Firma usando ElGamal
* t = β^r * r^s mod p * t == α^m mod p
28
TLS 1.3: Componentes que usan criptografía
Handshake protocol Record protocol Key derivation (HKDF).
29
TLS 1.3: Algoritmos para Integridad
AEAD (GCM, ChaCha20-Poly1305),
30
TLS 1.3: Algoritmos para Confidencialidad
AES-GCM, AES-CCM, ChaCha20-Poly1305 (todos en modos AEAD).
31
TLS 1.3: ¿Por qué tiene Perfect Forward Secrecy (PFS)?
Porque usa esquemas de intercambio de claves efímeras (DHE o ECDHE). Si se compromete la clave privada del servidor, sesiones anteriores no se pueden descifrar.
32
TLS 1.3: Algoritmos para Firma Digital
RSA-PSS, ECDSA, EdDSA (Ed25519).
33
TLS 1.3: Algoritmos para Intercambio de Claves
(EC)DHE, para PFS
34
TLS 1.3: ¿Qué pasa si no usamos certificados digitales?
No hay autenticación del servidor (vulnerable a MitM). La primera conexión es insegura sin autenticación de servidor.
35
TLS 1.3: Propósito de una CA (Certificate Authority)
Emitir certificados digitales firmados que ligan una identidad (dominio) a una clave pública, para que los clientes confíen en la autenticidad de la clave pública del servidor.
36
ElGamal key generation
* p -> rand * α ∈ -> rand(Z*p) * d ∈ {2,...,p-2} * β = α ^d mod (p)