Professional Documents
Culture Documents
Network Security
Sixth Edition
by William Stallings
Chapter 9
Public Key Cryptography and RSA
Misconceptions Concerning
Public-Key Encryption
Digital signatures
• How to verify that a message comes intact from the claimed sender
Encryption Decryption
Plaintext Public key Private key Ciphertext
algorithm algorithm
Accepts
The the
readable Performs ciphertext
Used for Used for The
message various and the
encryptio encryptio scrambled
or data transform- matching
n or n or message
that is fed ations on key and
decryptio decryptio produced
into the the produces
n n as output
algorithm plaintext the
as input original
plaintext
Public-Key
Cryptography
Table 9.2
Conventional and Public-Key Encryption
Public-Key Cryptosystem: Secrecy
Public-Key Cryptosystem: Authentication
Public-Key Cryptosystem:
Authentication and Secrecy
Applications for Public-Key
Cryptosystems
• Public-key cryptosystems can be classified into
three categories:
•The sender encrypts a message
Encryption/decryption with the recipient’s public key
• The sender knows the value of e, and only the receiver knows the
value of d
• Public-key cryptanalysis