Professional Documents
Culture Documents
cryptographic algorithms.
Cryptanalyst: a person who breaks
0 1 0 0 0 0 1 1 0 1 0 0 0 0 0 1 0 1 0 0 0 0 1 0
The key:
1 1 0 1 0 0 0 1 0 1 0 0 0 0 0 1 0 1 0 0 0 0 1 0
The ciphertext
1 0 0 1 0 0 1 0 0 0 1 1 1 0 0 0 0 1 1 0 1 0 0 1
Secure Communications
plaintext ciphertext
Manab Encrypt Decrypt Arunoday
Unwanted Party
Eve
7
Manab wants to send a message to Arun.
Manab uses Arun’s public key to encrypt
the message.
The encrypted message is sent over the
insecure medium.
Arun uses his private key to decrypt the
encrypted message.
No one but Arun knows the private key.
Symmetric Cryptography use a single key
shared by two communicating parties.
The shared key must remain secret to
11
In asymmetric cryptography, each user
has two keys: a public key and a private
key.
The public key is made public. For
example, it may be published on a Web
site.
The private key must be kept secret. It is
never shared with anyone.
The security of the private key in public
key crypto is as important as key security
in symmetric crypto.
Public key encryption enabled the
development of the technology of digital
signatures.
Digital signatures are somewhat analogous to
traditional handwritten signatures.
Digital signatures are strongly bound to the
document, but weakly bound to the individual.
A digital signature is computed, in part, using
the contents of the document being signed.
A signature should be proof of authenticity.
Its existence on a document should be able to
convince people that the person whose
signature appears on the document signed
the document.
A signature should be impossible to forge.