Next:
Encryption
Security Risks of Internet Communication
Terminology
Background: Number-Theoretic Algorithms
Size of Inputs
Cost of Operations
Review of Number Theory
Division Theorem
Equivalence
Common Divisors
Euclid's Theorem
Relative Primes
Unique Factorization
Finding the gcd
Euclid's Algorithm
Analysis
Extended Euclid
Correctness of Extended-Euclid
Modular Arithmetic
Solving Modular Linear Equations
Pseudocode
Chinese Remainder Theorem
Chinese Remainder Theorem (33.27 cont.)
Example
Corollary 33.29
Euler's phi function
Repeated Squaring
Pseudocode
Analysis
Encryption - Symmetric Cryptography
Encryption - Public-Key Cryptography
RSA Public-Key Cryptosystem
Public Key Cryptography
Protocol for Sending Encrypted Message M
Protocol for Sending a Signed Message M'
Protocol for Sending a Signed, Encrypted Message M
RSA Cryptosystem
Example of RSA Encryption
Implementing RSA
RSA Computation
Correctness
Primality Testing
Trial Division
Pseudo
Integer Factorizations
Hybrid Cryptosystems
Applications
Next: