Professional Documents
Culture Documents
Chapter 1
Chapter 1
Public-Key Cryptography
Symmetric Encryption Problems
• Key exchange
• Two parties already share a key: must have been distributed to them
• Key distribution center: could be compromised
• Digital signatures
• Verification that digital message sent by particular person
2
Public-Key Encryption
3
• Plaintext
• Readable message
• Encryption algorithm
• Performs transformations on plaintext
• Ciphertext
• Scrambled message produced by encryption algorithm
4
• Public and private keys
• Pair of keys are selected or generated
• One for encryption and other for decryption
• Transformations depend on the key used
• Decryption algorithm
• Accepts the ciphertext and the key
• Produces the original plaintext
5
Operation
• Only user (B) can decrypt message with her private key
6
Advantages
7
8
Applications: Confidentiality
Y = E(PUb, X)
X = D(PRb, Y)
9
10
Applications: Authentication
Y = E(PRa, X)
X = D(PUa, Y)
11
Applications: Confidentiality + Authentication