You are on page 1of 21

10.1.

5 Continued

Secret Communication with Knapsacks.

Figure 10.4 Secret communication with knapsack cryptosystem

10.15
10.1.5 Continued
Example 10. 4
This is a trivial (very insecure) example just to show the
procedure.

10.16
Fast Exponention / Square and multiply method
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner

You might also like