# C178 Cryptography 2b

rename
its4forscience's
version from
2018-01-15 17:02

## Section

Question | Answer |
---|---|

Two-key systems are referred to as... | Public Key Cryptography (PKC) (also PKI uses PKC as a part of the process) |

early public-key encryption system that uses large integers as the basis for the process | RSA |

works with both encryption and digital signatures | RSA |

used in many environments, like Sockets Layer (SSL), can be used for key exchange | RSA |

algorithm for exchanging keys over an insecure medium (unless IPSec) | Diffie-Hellman |

considered the founders of the public/private key concept | Diffie-Hellman |

provides similar functionality to RSA but uses smaller key sizes | Elliptic Curve Cryptography (ECC) |

based on the idea of using points on a curve, based on difficulty of solving discrete logarithm problems | Elliptic Curve Cryptography (ECC) |

key that exists only for that session | ephemeral key |

creates a key to use for single communication session and it is not used again | ephemeral key |

provides the perfect forward secrecy to DHE and ECDHE | ephemeral key |

Key agreement | Diffie-Hellman (this is an asymmetric algorithm) |

Transmitting digital signatures and key exchanges | El Gamal (this is an asymmetric algorithm) |

option to RSA uses less computing power and is popular in smaller devices | Elliptic Curve (ECC) (this is an asymmetric algorithm) |

most commonly used public-key algorithm, used for encryption and digital signatures | RSA (this is an asymmetric algorithm) |

security of algorithm should depend on secrecy of the key, not algorithm itself | Kerckhoffs's principle |

## Pages linking here (main versions and versions by same user)

No other pages link to this page. See Linking Quickstart for more info.