Review Videos for Lecture 8: Public Key Encryption + Digital Signatures
- Summer 2020 Slides
- Playlist (length: 1:06:08)
Public Key Encryption and Semantic Security
What is the main difference between the IND-CPA and Semantic Security games we've seen in class?
El-Gamal Encryption Scheme
(True/False) In El-Gamal encryption, the exponent r must be random
El Gamal Padding
(True/False) The padding scheme presented only works if the message size is less than or equal to the number of plaintext bits
(True/False) Hybrid encryption works by using symmetric encryption to encrypt a message, and encrypting the symmetric key with asymmetric encryption.
El Gamal Security + Asynchronous Encryption
(True/False) El Gamal is secure if the Discrete Log problem holds
El Gamal Intuition
Which two cryptographic techniques/protocols is El Gamal built on?
If Verify(PK, m, Sign(SK, m)) always outputted 1, a digital signature scheme would still satisfy correctness. Which other property would fail? How?
RSA Signature Scheme
(True/False) The modulus n must be a prime number
RSA Signature Scheme Security
In order for the RSA signature scheme to be secure, it is sufficient for the modulus n to be kept secret