What is Asymmetric Cryptography?
What kind of arithmetic does RSA encryption rely on?
Modular Arithmetic
Why is RSA Secure?
What is the purpose of creating a signature by computing a message digest instead of encryption with a private / public key?
Computation of a signature by applying a private key to a long message is computationally expensive
How is a fixed-length “fingerprint” computed?
Hash function H is applied to message m, giving a fixes size message digest H(m)
How does a signed message digest work?
What properties does a secure hash function have?
Provide some examples of Hash Function Algorithms
What is the main benefit of using a Message Authentication Code (MAC)?
What is a Message Authentication Code (MAC)?
Provide three examples of authentication encryption
What is a Certification Authority (CA)?
Describe how a certificate is checked
When Alice wants Bob’s public key:
- Bob provides a certificate
- Certificate is signed by CA
- Alice applies CA’s public key to confirm certificate’s authenticity
- Certificate contains Bob’s public key