pk.org: CS 419/Lecture Notes

Public key crytography and data integrity

Terms and concepts you should know

Paul Krzyzanowski – September 21, 2025

Public Key Cryptography

Shared symmetric keys
A common secret value used by two parties for symmetric encryption.
Trapdoor function
A one-way function that is easy to invert only with special secret knowledge.
One-way function
A function that is easy to compute but hard to reverse.
Public-key algorithm
A cryptographic algorithm that uses paired public and private keys.
Asymmetric cryptography
Another term for public key cryptography.
Public key
The openly shared key used for encryption or signature verification.
Private key
The secret key used for decryption or signing.
Factoring
The problem of finding the prime factors of a composite number; basis of RSA.
Discrete logarithms
The problem of finding the exponent in modular arithmetic; basis of Diffie–Hellman and ECC.
RSA
A public key system based on factoring, used for encryption and digital signatures. Larger key sizes are needed as computing power grows.
ECC
Elliptic-curve cryptography, based on discrete logarithms over elliptic curves.
Digital signature
A cryptographic method for proving authenticity and integrity of data.
Signing
Creating a digital signature with a private key.
Verification
Checking a digital signature using the corresponding public key.

Diffie–Hellman and Hybrid Systems

Diffie–Hellman Key Exchange
A protocol that allows two parties to establish a shared secret over an insecure channel.
Hybrid cryptosystem
Combines public key methods for key exchange with symmetric ciphers for encrypting data.
Forward secrecy
Ensures past session keys remain secure even if long-term keys are later compromised.
Session key
A temporary symmetric key used for one communication session.
Ephemeral key
A short-lived key created for a single run of a protocol and then discarded.

Hash Functions and Integrity

Cryptographic hash function
Maps input data to a fixed-length digest in a way that is hard to reverse.
Message digest
The fixed-size output of a hash function.
Preimage resistance
Hard to find an input that hashes to a given output.
Collision resistance
Hard to find two different inputs that produce the same hash.
Weak vs. strong collision resistance
Weak means hard to find a collision for a given input; strong means hard to find any two colliding inputs.
Avalanche effect
A small change in input causes a large, unpredictable change in the hash output.
Diffusion
Property where small changes in input cause widespread changes in output bits.
Pigeonhole principle
Explains why collisions must exist since many inputs map to fewer outputs.
Birthday paradox
Shows collisions are easier to find than expected; probability rises quickly with more inputs.
Recognize SHA-1, SHA-2 (SHA-256, SHA-512), SHA-3
Major standardized cryptographic hash functions.
Message authentication code (MAC)
A keyed hash value used to ensure message integrity.
HMAC
A MAC constructed from a hash function and a secret key.
CBC-MAC / CMAC
MACs built from block cipher modes.

Authentication and Trust

Digital certificates (X.509)
Certificates that bind a public key to an identity such as a domain name.
Certification Authority (CA)
A trusted entity that issues and signs digital certificates.
Trust store
A system-maintained collection of trusted root certificates.

Quantum and Post-Quantum

Quantum computing threat
The possibility that future quantum computers could break today’s public key systems.
Shor’s algorithm
A quantum algorithm that efficiently solves factoring and discrete logarithm problems.
Grover’s algorithm
A quantum algorithm that speeds up brute-force search, reducing effective key sizes.
Post-quantum cryptography (PQC)
New classical cryptosystems designed to resist both classical and quantum attacks.