CS 161 Discussion 4
Cryptography II
Shomil Jain
Asymmetric Cryptography
aka Public-Key Cryptography
Diffie Hellman Key Exchange
a public-key encryption scheme
Discussion Problem #1
El Gamal Encryption
another public-key encryption scheme!
it’s like one half of diffie hellman
Discussion Problem #2
Hashing
Q: Why did the breach contain only *weak* passwords? Why weren’t any lengthy/complex passwords revealed?
Q: How could Chegg have avoided this data breach?
Q: Why is the statement “hashing algorithms can be broken” misleading?
On the right is the most common passwords from the data breach.
Most likely: Chegg didn’t hash passwords with a salt!
(The leaked passwords didn’t include any *strong* passwords, indicating that these came from a pre-computed lookup table).