**Note**: This site is under construction. All dates and policies are tentative until this message goes away.

# Review Videos for Lecture 8: Public Key Encryption + Digital Signatures

- Summer 2020 Slides
- Playlist (length: 1:06:08)

## Public Key Encryption and Semantic Security

What is the main difference between the IND-CPA and Semantic Security games we've seen in class?

## El-Gamal Encryption Scheme

(True/False) In El-Gamal encryption, the exponent r must be random

## El Gamal Padding

(True/False) The padding scheme presented only works if the message size is less than or equal to the number of plaintext bits

## Hybrid Encryption

(True/False) Hybrid encryption works by using symmetric encryption to encrypt a message, and encrypting the symmetric key with asymmetric encryption.

## El Gamal Security + Asynchronous Encryption

(True/False) El Gamal is secure if the Discrete Log problem holds

## El Gamal Intuition

Which two cryptographic techniques/protocols is El Gamal built on?

## Digital Signatures

If Verify(PK, m, Sign(SK, m)) always outputted 1, a digital signature scheme would still satisfy correctness. Which other property would fail? How?

## RSA Signature Scheme

(True/False) The modulus n must be a prime number

## RSA Signature Scheme Security

In order for the RSA signature scheme to be secure, it is sufficient for the modulus n to be kept secret