
































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
This chapter delves into the principles of public-key cryptography, focusing on the widely used rsa algorithm. It explores the advantages and disadvantages of public-key encryption compared to symmetric encryption, highlighting its key applications in digital signatures and key management. The chapter also discusses the security of rsa, including potential attacks and countermeasures, such as timing attacks and chosen ciphertext attacks. It provides a detailed explanation of the rsa algorithm, including its computational aspects and key generation procedures. The chapter concludes with a summary of the key concepts and their implications for secure communication.
Typology: Lecture notes
1 / 40
This page cannot be seen from the preview
Don't miss anything!
Sixth Edition by William Stallings
Misconceptions Concerning Public-Key Encryption
Table 9. Terminology Related to Asymmetric Encryption Source: Glossary of Key Information Security Terms , NIST IR 7298 [KISS06]
Public-Key Cryptosystems
Public-Key Cryptograp hy
Public-Key Cryptosystem: Secrecy
Public-Key Cryptosystem: Authentication
Applications for Public-Key Cryptosystems
Table 9. Applications for Public-Key Cryptosystems Table 9.3 Applications for Public-Key Cryptosystems
Public-Key Requirements
Public-Key Cryptanalysis
RSA Algorithm
Algorithm Requirements