Notes for January 17, 1997
cs153r account set up to receive project descriptions and homework #1.
Basic idea: 2 keys, one private, one public
Cryptosystem must satisfy: (a), given public key, CI to get private
key; (b) cipher withstands chosen plaintext attack; (c) encryption,
decryption computationally feasible [note: commutativity not
Benefits: can give confidentiality or authentiction or both
Use of PKC
Normally used as key interchange system to exchange secret keys (cheap)
Then use secret key system (too expensive to use PKC for this)
Provides both authenticity and confidentiality
Go through algorithm, examples
Puzzle of the day
No right answer, but there are better places to look than others. I'll
ask this one periodically to see how your knowledge is changing.
You can also see this document as a
Binhex Framemaker version 5 document,
plain ASCII text document.
Send email to
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562
Page last modified on 1/23/97