Professional Documents
Culture Documents
SHOPPING
MILIATARY
CIET
SECRECY
AUTHENTICATION
NONREPUDIATION
INTEGRITY CONTROL
CIET
Encryption: only the authorized party can
understand the encrypted message.
CIET
4
Cryptography
Cryptography
symmetric-key cryptography
public-key cryptography
Used for
authentication,
integrity protection,
encryption,
key management
CIET
5
C-ciphertext p-plaintext E-encrptionkey D=decryptionkey
C=E[P]
P=D[C]
MEDHA-2K7 GIET
plaintext cipher text plaintext
CIET
plaintext cipher text plaintext
knapsack.
Ciphertext : C=M^e(mod n)
plaintext : C
Ciphertext : M=C^d(mod n)
CIET
Sender A does the following:
CIET
Recipient B does the following:
CIET
Menezes, Alfred; van Oorschot, Paul C.; and Vanstone, Scott A. Handbook
of Applied Cryptography. CRC Press, October 1996. ISBN 0-8493-8523-7
R. Rivest, A. Shamir, L. Adleman. A Method for Obtaining Digital Signatures
and Public-Key Cryptosystems. Communications of the ACM, Vol. 21 (2),
pp.120–126. 1978. Previously released as an MIT "Technical Memo" in April
1977. Initial publication of the RSA scheme.
Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein.
Introduction to Algorithms, Second Edition. MIT Press and McGraw-Hill, 2001.
ISBN 0-262-03293-7. Section 31.7: The RSA public-key cryptosystem, pp.881–
www.abcseo.com
www.google.com
CIET
CIET
CIET
CIET