Notes for January 21, 1998
- Greetings and felicitations!
- Reading: Pfleeger, pp. 91-118
- Puzzle of the day
- Fun stuff
- DES
- Go through the algorithm
- Public Key Cryptography
- Basic idea: 2 keys, one private, one public
- Cryptosystem must satisfy:
- given public key, CI to get private key;
- cipher withstands chosen plaintext attack; and
- encryption, decryption computationally feasible
[note: commutativity NOT required]
- Benefits: can give confidentiality or authentiction or both
- Use of public key cryptosystem
- Normally used as key interchange system to exchange secret keys
(cheap)
- Then use secret key system (too expensive to use PKC for this)
[ ended here ]
You can also see this document
in its native format,
in Postscript,
in PDF,
or
in ASCII text.
Send email to
cs153@csif.cs.ucdavis.edu.
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562
Page last modified on /1/21/98