Scale of key robustness
-
Imagine a ciphertext encrypted with a 128 bits key and let’s presume we have a very powerful computer that can brute force 10^12 keys per second.
- How many keys in total?
- How many keys per year can we compute?
- How long would it take to compute all keys?
- How many computers would you need to crack all keys within a day?
-
Same question with 256 bits?
Authenticated Encryption
Let us assume that Alice and Bob have exchange a session k. Alice sends a message m to Bob encrypted with the key k AES with an Authenticated Encryption mode (encrypt-then-mac method).
-
How does Alice encrypts m with the key k?
-
What does she sent over to Bob?
-
How does bob decrypt that ciphertext while making sure that Mallory has not tampered with the message?
Asymmetric Cryptography
Let us assume that Alice has a asymmetric key pair (ksA, KpA) and Bob has an asymmetric key pair (ksB, KpB) and thet they each others public key. To simplify the exercise, let us assumed that we can use these asymmetric keys to encrypt and decrypt any message of any length easily (though this is not true in practice).
-
Alice wishes to send a signed but not encrypted message to Bob, how does she generates the signature s and what does she send over to Bob?
-
How does Bob verifies the signature?
-
Alice wishes to send an encrypted and signed message to Bob, how does she “sign-then-encrypt” the message and what does she send over to Bob?
-
How does Bob extract the message and verifies the signature?