COMP10001 Study Guide - Final Guide: Public-Key Cryptography, Electronic Voting, Qubit

57 views3 pages
Sending messages that are secret from everyone but the intended recipient
-
Encrypting = sender hides the message for sending
-
Decrypting = receiver unhides and recovers the message
-
Cryptography:
Sender and receiver agree on the secret key in advance
-
Encrypting and decrypting use the same key
-
Secret
-
A public key for encrypting
A private key for decrypting
Receiver generates two keys
-
Public key is publicised and used for encrypting messages
-
Private key is kept secret and used by the receiver for decrypting messages
-
Public key cryptography:
Exchanging a secret key for secret
-
key cryptography
-
Electronic voting
-
RSA parameters are properly generated
A signature is only as good as confidence in having the right public key
Only secure if
-
Uses:
The message says "XYZ is the public key of so
-
and
-
so"
The signer is supposed to be someone whose public key you already know
A certificate is a special kind of signed message in which
-
Certificates:
Only eligible voters vote, at most once
Voters should get evidence that their vote was cast as they intended and counted
as cast
Everyone gets evidence votes were properly tallied
Verifiability
Coercers can't manipulate the inputs
Privacy
Security requirements
-
Restriction of crypto to 512
-
bit
Attacker can intercept SSL/TLS key establishment
Factoring RSA Export Keys (FREAK) attack
-
Internet voting:
Cryptography
Wednesday, 6 June 2018 2:01 PM
Foundations of Computing Page 1
Unlock document

This preview shows page 1 of the document.
Unlock all 3 pages and 3 million more documents.

Already have an account? Log in