CYG Chapter 1 Introduction

Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 1 Introduction

Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 1 Introduction


Set of flashcards Details

Flashcards 15
Language English
Category Computer Science
Level University
Created / Updated 21.03.2017 / 13.04.2017
Weblink
https://card2brain.ch/box/20170321_cyg_chapter_1_introduction
Embed
<iframe src="https://card2brain.ch/box/20170321_cyg_chapter_1_introduction/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

What is the definition of cryptography?

[definition.introduction]

Cryptography is the study of mathematical techniques related to aspects of information security.”

What are the forms of information security?

[definition.introduction, 4]

1. Confidentiality

2. Data integrity

3. Entity authentication

4.Data origin authentication

What are the topics of cryptography?

[topics.introduction, 4]

1. Concealing data from eavesdroppers and only available to entitled users

2. Authentication of users and messages

3. Anonymity

4. Protocols for transmission and key management

What was before 1975?

[history.introduction]

Cryptography was mostly developed by the military

What was in the late 1970s?

[history.introduction]

Networks established, leading to growing interest in protecting privacy and confidentiality

What was in 1976?

[history.introduction]

Diffie and Hellman with paper ‘New Directions in Cryptography’

What did the paper ‘New Directions in Cryptography’ introduced?

[diffiehellman.history.introduction]

Public-key technique

By which today’s applications is the technique used?

[diffiehellman.history.introduction, 6]

1. e-banking

2. e-commerce

3. e-cash

4.Automatic debiting

5. Computer access controls

6. Secure communication

What are the notations of participants in communication?

[notation.fundamentalknowledge.introduction, 3]

1. Alice

2. Bob

3. If required, continue alphabetic with (for example) Cherie

What are the notations of opponents in communication?

[notation.fundamentalknowledge.introduction, 2]

1. Oskar

2. Eve // From eavesdropping

Name institutions for cryptography?

[institutions.fundamentalknowledge.introduction, 3]

1. NSA

2. IACR

3. BSI

What are the characteristics?

[NSA.institutions.fundamentalknowledge.introduction, 2]

1. Founded in 1952

2. Largest employer for mathematicians

What are the characteristics?

[IACR.institutions.fundamentalknowledge.introduction, 2]

1. Founded in 1983

2. Three conferences per year

Which are the three conferences?

[IACR.institutions.fundamentalknowledge.introduction, 3]

1. CRYPTO in the USA, 2. EUROCRYPT and 3. ASIACRYPT

What are the characteristics?

[BSI.institutions.fundamentalknowledge.introduction, 2]

1. In Bonn

2. Most important institution in Germany