sequence can be inferred from the others Unpredictability • Each number is statistically independent of other numbers in the sequence • Opponent should not be able to predict future elements of the sequence on the basis of earlier elements
Summary • Public-key encryption Structure Applications for public-key cryptosystems Requirements for public-key cryptography Asymmetric encryption algorithms • Digital signatures and key management Digital signature Public-key certificates Symmetric key exchange using public-key encryption Digital envelopes • Confidentiality with symmetric encryption Symmetric encryption Symmetric block encryption algorithms Stream ciphers • Message authentication and hash functions Authentication using symmetric encryption Message authentication without message encryption Secure hash functions Other applications of hash functions • Random numbers
You've reached the end of your free preview.
Want to read all 31 pages?
- Winter '18