Review Questions
1. What are two different uses of public-key cryptography related to key distribution?
- The distribution of public keys
- The use of public-key encryption to distribute secret keys.
2. List four general categories of schemes for the distribution of public keys.
- Public announcement: Essentially you publish your public key yourself and people find it in the "wild" as it were and trust that it is really yours.
- Publicly available directory: Maintained by some trusted entity
- Public-key Authority: Requests are made to the Athority and it sends a private key encrypted response containing the requested key. Thus we know that the key came from the authority. But this becomes the bottleneck of the system.
- Public-key Certificates:
3. What are the essential ingredientes of a public-key directory?
- The directory authority maintains a {name, public-key}
- Participants register a public key with the directory authority in person or through some secure authenticated communication.
- Participants may replace their public key at any time.
- Periodically the authority publishes the entire directory or updates to it. (With the net this is no longer an issue.)
- Participants may access the directory electroniclly via a secure authenticated communication.
4. What is a public-key certificate?
A certificate is issued by the certificate authority (or Public Key Authority) and contains the name and public key of the entity that owns the corresponding private key. Other information may also be contained on the certificate including the authority name, and expiration time.
5. What are the requirements for the use of a public-key certificate scheme?
A public-key certificate meets the following requirements:
- Any participant can read a certificate to determine the name and public key of the certificate's holder.
- Any participant can verify theat the certificate originated from the certificate authority and is not counterfeit.
- Only ther certificate authority can create and update certificates.
- Any participant can verify the currency of the certificate.
6. Briefly explain Diffie-Hellman key exchange.
Agree on Public Elements: |
Prime q, and $$\alpha,~\alpha<q$ and $\alpha$$ is a primitive root of q |
|
User A/B Private/Public Generation: |
Select $$X_{A/B},~X_{A/B}<q$$ and calculate public $$Y_{A/B}=\alpha^{X_{A/B}}\bmod q$$. |
|
Secret Key Generation: |
Calculate $$K=(Y_A)^{X_{A/B}} \bmod q$$. |
7. What is an elliptic curve?
Elliptic curves are curves defined by equations of the form
$$$y^2+axy+by=x^3+cx^2+dx+e$$$
and are said to be cubic or of degree 3. We also define a point denoted O that is called the point at infinity or the zero point.
8. What is the zero point of an elliptic curve?
O serves as the additive identity.
9. What is the sum of three points on an elliptic curve that lie on a straight line?
O because the line crosses at P, Q, and -(P+Q) by the definition of addition. So P+Q+ -(P+Q)=O.