1 / 26
文档名称:

第9章 公钥密码学与RSA.ppt

格式:ppt   大小:342KB   页数:26页
下载后只包含 1 个 PPT 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

分享

预览

第9章 公钥密码学与RSA.ppt

上传人:mh900965 2018/3/9 文件大小:342 KB

下载得到文件列表

第9章 公钥密码学与RSA.ppt

相关文档

文档介绍

文档介绍:第九章公钥密码学与RSA
Private-Key Cryptography
traditional private/secret/single key cryptography uses one key shared by both sender and receiver
if this key is munications promised
also is symmetric, parties are equal
hence does not protect sender from receiver forging a message & claiming is sent by sender
Public-Key Cryptography
probably most significant advance in the 3000 year history of cryptography
uses two keys – a public & a private key
asymmetric since parties are not equal
uses clever application of number theoretic concepts to plements rather than replaces private key crypto
Why Public-Key Cryptography?
developed to address two key issues:
key distribution – how to have munications in general without having to trust a KDC with your key
digital signatures – how to verify a es intact from the claimed sender
public invention due to Whitfield Diffie & Martin Hellman at Stanford Univ. in 1976
known earlier in munity
Public-Key Cryptography
public-key/two-key/asymmetric cryptography involves the use of two keys:
a public-key, which may be known by anybody, and can be used to encrypt messages, and verify signatures
a private-key, known only to the recipient, used to decrypt messages, and sign (create) signatures
is asymmetric because
those who encrypt messages or verify signatures cannot decrypt messages or create signatures
Public-Key Cryptography
Public-Key Characteristics
Public-Key algorithms rely on two keys where:
it putationally infeasible to find decryption key knowing only algorithm & encryption key
it putationally easy to en/decrypt messages when the relevant (en/decrypt) key is known
either of the two related keys can be used for encryption, with the other used for decryption (for some algorithms)
Public-Key Cryptosystems
Public-Key Applications
can classify uses into 3 categories:
encryption/decryption (provide secrecy)
digital signatures (provide authentication)
key exchange (of session keys)
some algorithms are suitable for all uses, o