Professional Documents
Culture Documents
Asymmetric-Key Cryptography
2008/2
Outline
Asymmetric Encryption Principles Public-Key Cryptography Algorithms
2008/2
2008/2
Some algorithms are suitable for all three applications, whereas others can be used only for one or two of these applications
It is computationally easy for the receiver B to decrypt the resulting ciphertext using the private key to recover the original message
M = DKRb(C) = DKRb[EKUb(M)]
It is computationally infeasible for an opponent, knowing the public key, KUb, to determine the private key, KRb. It is computationally infeasible for an opponent, knowning the public key, KUb, and a ciphertext, C, to recover the original message, M.
2008/2 Panupong Sornkhom, Department of Electrical and Computer Engineering, Naresuan University 7
2008/2
2008/2
11
References
[1] William Stallings, Network Security Essentials: Applications and Standards, 2nd ed, Prentice Hall. [2] Behrouz A. Forouzan, Introduction to Cryptography and Network Security, McGRAW-HILL.
2008/2
12