ALGORITHMS
and TECHNIQUES
A. Public-Key Encryption and
Digital Signatures
1. General
- Question 03. What is Public-Key Cryptography?
- Question 04. What are the Advantages and Disadvantages
of Public-Key Cryptography Compared with Secret-Key
Cryptography?
- Question 05. Do Digital Signatures Help Detect Altered
Documents and Transmission Errors?
- Question 06. What is a One-Way Function?
- Question 07. What is the Significance of One-Way
Functions for Cryptography?
2. RSA
- Question 08. What is RSA?
- Question 09. How Fast is RSA?
- Question 10. What Would it Take to Break RSA?
- Question 11. Are Strong Primes Necessary in RSA?
- Question 12. How Large a Modulus (Key) Should be Used in
RSA?
- Question 13. How Large Should the Primes be?
- Question 14. Can Users of RSA run out of Distinct
Primes?
- Question 15. How do You Know if a Number is Prime?
- Question 16. How is RSA used for Encryption in Practice?
- Question 17. How is RSA Used for Authentication in
Practice? What are RSA Digital Signatures?
- Question 18. What are the Alternatives to RSA?
- Question 19. Is RSA Currently in Use Today?
- Question 20. Is RSA an Official Standard Today?
- Question 21. Is RSA a De Facto Standard?
- Question 22. Is RSA Patented?
- Question 23. Can RSA be Exported from the United States?
3. Diffie-Hellman
- Question 24. What is Diffie-Hellman?
- Question 25. What is Authenticated Diffie-Hellman Key
Agreement?
4. DSA
- Question 26. What are DSA and DSS?
- Question 27. Is DSA Secure?
- Question 28. Is the Use of DSA Covered by Any Patents?
5. Other Public-Key Encryption and
Signature Algorithms
- Question 29. What is the ElGamal Cryptosystem?
- Question 30. What are Elliptic Curves?
- Question 31. What are Elliptic Curve Cryptosystems?
- Question 32. What are Knapsack Cryptosystems?
- Question 33. What is LUC?
- Question 34. What is the McEliece Cryptosystem?
- Question 35. What is Merkle's Tree Signature Scheme?
- Question 36. What is Probabilistic Encryption?
- Question 37. What is the Rabin Signature Scheme?
6. Special Digital Signature Schemes
- Question 38. What are Special Signature Schemes?
- Question 39. What is a Blind Signature Scheme?
- Question 40. What is a Designated Confirmer Signature?
- Question 41. What is a Fail-stop Signature Scheme?
- Question 42. What is a Group Signature?
- Question 43. What is a One-time Signature Scheme?
- Question 44. What is an Undeniable Signature Scheme?
7. Factoring and Discrete Logarithms
- Question 45. What is the Factoring Problem?
- Question 46. What is the Significance of Factoring in
Cryptography?
- Question 47. Has Factoring Been Getting Easier?
- Question 48. What are the Best Factoring Methods in Use
Today?
- Question 49. What are the Prospects for a Theoretical
Factoring Breakthrough?
- Question 50. What is the RSA Factoring Challenge?
- Question 51. What is RSA-129?
- Question 52. What is the Discrete Logarithm Problem?
- Question 53. Which is Easier: Factoring or Discrete
Logarithm?
B. Block Ciphers
1. General
- Question 54. What is a Block Cipher?
- Question 55. What is an Iterated Block Cipher?
- Question 56. What is a Feistel Cipher?
- Question 57. What is Exhaustive Key Search?
- Question 58. What is Differential Cryptanalysis?
- Question 59. What is Linear Cryptanalysis?
- Question 60. What is a Weak Key for a Block Cipher?
- Question 61. What are Algebraic Attacks?
- Question 62. How Can Data Compression be Used With
Encryption?
- Question 63. At What Point Does an Attack Become
Practical?
2. DES
- Question 64. What is DES?
- Question 65. Has DES been Broken?
- Question 66. How Does One Use DES Securely?
- Question 67. Should One Test for Weak Keys in DES?
- Question 68. Can DES be Exported from the United States?
- Question 69. What are the Alternatives to DES?
- Question 70. Is DES a Group?
- Question 71. What is DES with Independent Subkeys?
- Question 72. What is Triple-DES?
- Question 73. How does One Use Triple-DES in CBC Mode?
- Question 74. What are G-DES, DESX?
3. Other Block Ciphers
- Question 75. What is RC2?
- Question 76. What is RC5?
- Question 77. What is IDEA?
- Question 78. What is SAFER?
- Question 79. What is FEAL?
- Question 80. What is Skipjack?
- Question 81. What is Blowfish?
4. Modes and Multiple Encryption
- Question 82. What are the ECB and CBC Modes?
- Question 83. What are the CFB and OFB modes?
- Question 84. What are the Counter and PCBC Modes?
- Question 85. What is Multiple Encryption?
C. Stream Ciphers
- Question 86. What is a Stream Cipher?
- Question 87. What is RC4?
- Question 88. What is SEAL?
- Question 89. What is a Linear Feedback Shift Register?
- Question 90. What are Shift Register Cascades?
- Question 91. What are the Shrinking and Self-Shrinking
Generators?
- Question 92. What Other Stream Ciphers Are There?
- Question 93. What is a One-time Pad?
D. Hash Functions
- Question 094. What is a Hash Function?
- Question 095. What is a birthday attack?
- Question 096. How does the length of a hash value affect
security?
- Question 097. What is a compression function?
- Question 098. What are pseudo-collisions?
- Question 099. What are MD2, MD4 and MD5?
- Question 100. What is the Secure Hash Algorithm (SHA and
SHA-1)?
- Question 101. What Other Hash Functions Are There?
E. Other Techniques
1. Message Authentication Codes
Question 102. What are Message Authentication Codes (MACs)?
2. Secret Sharing
- Question 103. What are Secret Sharing Schemes?
- Question 104. What is Shamir's Secret Sharing Scheme?
- Question 105. What is Blakley's Secret Sharing Scheme?
- Question 106. What are Visual Secret Sharing Schemes?
3. Zero Knowledge
Question 107. What are Interactive Proofs and Zero-Knowledge
Proofs?
4. Digital Timestamping
Question 108. How do Digital Timestamps Support Digital
Signatures?
F. New Technologies
- Question 109. What is Quantum Computing?
- Question 110. What is Quantum Cryptography?
- Question 111. What is DNA Computing?