Professional Documents
Culture Documents
Review Topics
Goals of Crypt algorithms. Hash algorithms Symmetric key encryption Asymmetric key encryption Diffie-Hellman crypto algorithm
Hashing
CLEAR TEXT
ENCRYPTED MESSAGE
CLEAR TEXT
Encrypted message is decrypted with the shared secret key by the receiver.
Clear Text
Encrypted Text
Clear Text
The sender uses the recipients public key to encrypt the clear text message.
Discrete Logarithm Problem Both Problems are known to be intractable (difficulties of these problems depend on the size of the problem, e.g., size of g and private data a, b Alice and bob choose; as the size of the problem increases, the complexity exponentially grows).