DOC PREVIEW
UCF COT 4810 - Public Key Cryptography

This preview shows page 1-2-3-4 out of 12 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Public Key CryptographyWhat is Cryptography?ApplicationsSlide 4RSA ExampleRSA ContinuedDigital SigningKey DisseminationSummaryHomework ProblemReferencesSlide 12Colin DoughertyWhat is Cryptography?PrivateSymmetric keyExample: AESPublic Asymmetric keysExample: RSAApplicationsReal WorldSpies, NSA, CIAFinancial InstitutionsAlice, Bob and EveComputer SciencePrimes, factoring, hashingRandomnessNP complete problemsPublic Key CryptographyDiffie-Hellman Public Key exchange systemSubset-sum problemRivest, Shamir and Adleman Factoring very large numbersRSA ExampleRandom Primes: p = 47 and q = 731.79769313486231590772930519078e+308n = p * q = 3431φ = (p – 1) * (q – 1) = 3312 1<e<n and relatively prime to φ; e = 425Modular inverse of e: d = 1769RSA ContinuedEncrypt: plaintext = 707c = me mod nc = 707425 (mod 3431) = 2142Decrypt: cipher text = 2142m = cd mod nm = 21421769 (mod 3431) = 707Digital SigningAlice Signature = hashd mod nBob checks Alice’s Signature hashe mod nKey DisseminationSummaryPublic Key CryptographyPublic and Private KeysEncryption and DecryptionKey ExchangeDigital SignaturesHomework ProblemReferencesModern Language Association (MLA): "cryptography." The American Heritage® Dictionary of the English Language, Fourth Edition. Houghton Mifflin Company, 2004. Rivest, R. L., Shamir, A., Adleman, L. A.: A method for obtaining digital signatures and public-key cryptosystems; Communications of the ACM, Vol.21, Nr.2, 1978, S.120-126.Diffie, W., and Hellman, M. New directions in cryptography. IEEE Trans. Inform.Theory IT-22, (Nov. 1976), 644-654.A. K. Dewdney: The New Turing OmnibusColin


View Full Document

UCF COT 4810 - Public Key Cryptography

Documents in this Course
Spoofing

Spoofing

25 pages

CAPTCHA

CAPTCHA

18 pages

Load more
Download Public Key Cryptography
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Public Key Cryptography and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Public Key Cryptography 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?