17 lines
571 B
Markdown
17 lines
571 B
Markdown
|
Lecture Topic: Public Key Encryption
|
||
|
Public Key Encryption, first proposed by Diffie and Hellman in 1976.
|
||
|
|
||
|
Asymmetric Encryption is when we use different keys for encrypting and decrypting text. It is slow and is used for encrypting keys, so you have to remember
|
||
|
|
||
|
One key: fast, large data
|
||
|
Pair of keys: slow, small data
|
||
|
|
||
|
Requirements for public key cryptography
|
||
|
It is computationally easy for party B to generate a pair
|
||
|
It is computationally easy for a sender A knowing the public key and the message to be encrypted M to generate the corresponding cipher text:
|
||
|
-
|
||
|
-
|
||
|
-
|
||
|
|
||
|
|