COMP10001 Study Guide - Final Guide: Public-Key Cryptography, Electronic Voting, Qubit
Sending messages that are secret from everyone but the intended recipient
-
Encrypting = sender hides the message for sending
-
Decrypting = receiver unhides and recovers the message
-
Cryptography:
Sender and receiver agree on the secret key in advance
-
Encrypting and decrypting use the same key
-
Secret
-
key cryptography:
A public key for encrypting
○
A private key for decrypting
○
Receiver generates two keys
-
Public key is publicised and used for encrypting messages
-
Private key is kept secret and used by the receiver for decrypting messages
-
Public key cryptography:
Exchanging a secret key for secret
-
key cryptography
-
Electronic voting
-
RSA parameters are properly generated
○
A signature is only as good as confidence in having the right public key
○
Only secure if
-
Uses:
The message says "XYZ is the public key of so
-
and
-
so"
○
The signer is supposed to be someone whose public key you already know
○
A certificate is a special kind of signed message in which
-
Certificates:
Only eligible voters vote, at most once
Voters should get evidence that their vote was cast as they intended and counted
as cast
Everyone gets evidence votes were properly tallied
Verifiability
○
Coercers can't manipulate the inputs
Privacy
○
Security requirements
-
Restriction of crypto to 512
-
bit
○
Attacker can intercept SSL/TLS key establishment
○
Factoring RSA Export Keys (FREAK) attack
-
Internet voting:
Cryptography
Wednesday, 6 June 2018 2:01 PM
Foundations of Computing Page 1