Notes for January 17, 1997
-
Hello
-
cs153r account set up to receive project descriptions and homework #1.
-
Public-Key Cryptography
-
Basic idea: 2 keys, one private, one public
-
Cryptosystem must satisfy: (a), given public key, CI to get private
key; (b) cipher withstands chosen plaintext attack; (c) encryption,
decryption computationally feasible [note: commutativity not
required]
-
Benefits: can give confidentiality or authentiction or both
-
Use of PKC
-
Normally used as key interchange system to exchange secret keys (cheap)
-
Then use secret key system (too expensive to use PKC for this)
-
RSA
Provides both authenticity and confidentiality
-
Go through algorithm, examples
-
Puzzle of the day
-
No right answer, but there are better places to look than others. I'll
ask this one periodically to see how your knowledge is changing.
You can also see this document as a
Binhex Framemaker version 5 document,
Postscript document,
or a
plain ASCII text document.
Send email to
[email protected].
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562
Page last modified on 1/23/97