Finish up Public Key Crypto, Start Hash Functions




CS166

Chris Pollett

Oct 1, 2012

Outline

Sign and Encrypt
versus
Encrypt and Sign

Confidentiality and Non-repudiation?

Sign and Encrypt

Diagram of Sign then Encrypt

Encrypt and Sign

Diagram of Sign then Encrypt

Public Key Infrastructure

Public Key Certificate

Certificate Authority

PKI

PKI Trust Models -- Monopoly model

PKI Trust Models -- Oligarchy Model

PKI Trust Models -- Anarchy Model

Symmetric Key vs Public Key

Notation Reminder

Real World Confidentiality

Quiz

Which of the following is true?

  1. (2, 3, 9, 15, 30, 57, 120, 251) might be a set of weights for a superincreasing knapsack problem.
  2. Too small messages compared to the modulus might make one vulnerable to a cube root attack in RSA.
  3. Exponentiation on elliptic curves is used in most EC cryptosystems.

Hash Function Motivation (1)

Hash Function Motivation (2)

Crypto Hash Function

Pre-Birthday Problem

Birthday Problem

Of Hashes and Birthdays