Modular inverse e.g 3^(-1) mod 7 means solving…
3 • x == 1 mod 7
Euler phi function phi(n) counts …
Number of integers between 1 and n that are relatively prime to n.
Chinese remainder theorem can be used to solve…
System of congruences with different moduli
Substitution cipher is vulnerable to …
Shift cipher is most vulnerable to…
Brute force (exhaustive search) because of very small key space
In a One-Time pad, the key must be at least as long as the message.
True
4 goals of cryptography
Passive attacker threatens which goal?
Confidentiality
Active attacker threatens which goal?
All of them
What are pros and cons of symmetric key cryptosystems?
Pro: very fast
Cons: key management (ever user pair needs key O(n^2)
What is Kerckhoff’s Principle?
Security should only depend on the key itself. Assume attacker knows what algorithm is being used.
What is Square and Multiply used for?
Solve a^b mod n for a large exponent b
What is the concept of diffusion?
One character change in plaintext should affect as much ciphertext characters as possible
What is the concept of confusion?
The key/plaintext shouldn’t relate to ciphertext in a simple way
An affine cipher can be broken with 2 plaintexts.
True
Solving -21 mod 26 means…
Adding 26 to -21 until we get a positive result [0, 25]
RSA is secure under assumption that …
Factorization is hard
Diffie-Helman is secure under the assumption that …
Discrete log problem is hard
Rabin cryptosystem is secure under the assumption that …
Factorization is hard (factoring large composites)
Rabin is secure against passive adversary.
True
What are timing attacks?
By measuring time required to perform decryption, an attacker can figure out the private key
Name 2 countermeasures to timing attacks
2 ways to break RSA without factoring n
Describe forward search attack
If message space is small, attacker can create dictionary of encrypted messages (since pk is known, encrypt all possible messages and store). When attacker seems a message, it can compare to encrypted and find out the message.