14 - Introduction Public Key Cryptography Cryptography and...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Introduction Public Key Cryptography Cryptography and Protocols Andrei Bulatov Cryptography and Protocols Public Key Cryptography 14-2 Asymmetric Encryption Schemes Main idea: Use two keys, public and private Everyone can encrypt, but to decrypt one needs the private key Useful if we need to communicate with someone we dont have any preliminary agreements Usually slower and more expensive than private cryptography This defines usual applications:- key distribution- digital signatures- Cryptography and Protocols Public Key Cryptography 14-3 Asymmetric Encryption Schemes (cntd) Definition An asymmetric encryption scheme (AES) is a triple of algorithms (K,E,D):- keys: (e,d) e is a public encryption key d is a private decryption key- encryption: - decryption: C P E e = ) ( C P D d = ) ( Cryptography and Protocols Public Key Cryptography 14-4 Trapdoor Functions Requirement to a AES: it has to be a trapdoor function:- All algorithms are polynomial time (efficient)- K: is a randomized algorithm- : is a permutation on some set...
View Full Document

This note was uploaded on 03/05/2012 for the course CMPT 404 taught by Professor Andreia.bulatov during the Spring '12 term at Simon Fraser.

Page1 / 10

14 - Introduction Public Key Cryptography Cryptography and...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online