Outline for November 13, 2006

Reading: §9.2–9.3

  1. Greetings and felicitations!
    1. Quick discussion of midterm
  2. Product ciphers: DES
  3. Public-Key Cryptography
    1. Basic idea: 2 keys, one private, one public
    2. Cryptosystem must satisfy:
      1. Given public key, computationally infeasible to get private key;
      2. Cipher withstands chosen plaintext attack;
      3. Encryption, decryption computationally feasible [note: commutativity not required]
    3. Benefits: can give confidentiality or authentication or both

You can also obtain a PDF version of this. Version of November 14, 2006 at 9:24 PM