Escolar Documentos
Profissional Documentos
Cultura Documentos
CRYPTOGRAPHY
AND RSA
PRIVATE-KEY CRYPTOGRAPHY
Asymmetric Keys
related keys, a public key and a private key, that are used
to perform complementary operations, such as encryption and
decryption or signature generation and signature verification.
Public Key Certificate
The
two keys have the property that deriving the private key
from the public key is computationally infeasible.
Public Key Infrastructure (PKI)
PUBLIC-KEY CRYPTOGRAPHY
PUBLIC-KEY CRYPTOSYSTEMS
PUBLIC-KEY APPLICATIONS
(provide secrecy)
digital signatures (provide authentication)
key exchange (of session keys)
RSA
by
uses
by:
selecting two large primes at random - p, q
computing their system modulus n=p.q
note
(n)=(p-1)(q-1)
selecting
solve
e.d=1
publish
RSA USE
RSA ALGORITHM
\\\\\\
Private
6.
7.
RSA SECURITY
Timing
Chosen
RSA)