Notes for January 17, 1997

  1. Hello
    1. cs153r account set up to receive project descriptions and homework #1.
  2. Public-Key Cryptography
    1. Basic idea: 2 keys, one private, one public
    2. Cryptosystem must satisfy: (a), given public key, CI to get private key; (b) cipher withstands chosen plaintext attack; (c) encryption, decryption computationally feasible [note: commutativity not required]
    3. Benefits: can give confidentiality or authentiction or both
  3. Use of PKC
    1. Normally used as key interchange system to exchange secret keys (cheap)
    2. Then use secret key system (too expensive to use PKC for this)
  4. RSA
      Provides both authenticity and confidentiality
    1. Go through algorithm, examples
  5. Puzzle of the day
    1. No right answer, but there are better places to look than others. I'll ask this one periodically to see how your knowledge is changing.


You can also see this document as a Binhex Framemaker version 5 document, Postscript document, or a plain ASCII text document.
Send email to [email protected].

Department of Computer Science
University of California at Davis
Davis, CA 95616-8562



Page last modified on 1/23/97