Renormalize files
This commit is contained in:
@@ -1,16 +1,16 @@
|
||||
Lecture Topic: Public Key Encryption
|
||||
Public Key Encryption, first proposed by Diffie and Hellman in 1976.
|
||||
|
||||
Asymmetric Encryption is when we use different keys for encrypting and decrypting text. It is slow and is used for encrypting keys, so you have to remember
|
||||
|
||||
One key: fast, large data
|
||||
Pair of keys: slow, small data
|
||||
|
||||
Requirements for public key cryptography
|
||||
It is computationally easy for party B to generate a pair
|
||||
It is computationally easy for a sender A knowing the public key and the message to be encrypted M to generate the corresponding cipher text:
|
||||
-
|
||||
-
|
||||
-
|
||||
|
||||
|
||||
Lecture Topic: Public Key Encryption
|
||||
Public Key Encryption, first proposed by Diffie and Hellman in 1976.
|
||||
|
||||
Asymmetric Encryption is when we use different keys for encrypting and decrypting text. It is slow and is used for encrypting keys, so you have to remember
|
||||
|
||||
One key: fast, large data
|
||||
Pair of keys: slow, small data
|
||||
|
||||
Requirements for public key cryptography
|
||||
It is computationally easy for party B to generate a pair
|
||||
It is computationally easy for a sender A knowing the public key and the message to be encrypted M to generate the corresponding cipher text:
|
||||
-
|
||||
-
|
||||
-
|
||||
|
||||
|
||||
|
Reference in New Issue
Block a user