Next:
Up:
Previous:
Public Key Cryptography
Each participant has
public key - released to others
secret key - kept secret
Example Alice (
P
A
,
S
A
), Bob (
P
B
,
S
B
)
Public and Secret functions are inverses
M =
S
A
(
P
A
(M))
M =
P
A
(
S
A
(M))
Must be able to reveal
P
A
while
S
A
remains uncomputable (or at least very difficult to compute).
Security depends on method of computing keys
RSA - factoring large integers
McEliecee - decoding linear code (NP-Complete)
El Gamal - discrete logarithm problem
Chor-Rivest - knapsack (NP-Complete)
Next:
Up:
Previous: