Cryptography and Network Security Chapter 10. Fourth Edition by William Stallings Lecture slides by Lawrie Brown. Chapter 10 – Key Management; Other Public Key Cryptosystems.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Cryptography and Network SecurityChapter 10
by William Stallings
Lecture slides by Lawrie Brown
No Singhalese, whether man or woman, would venture out of the house without a bunch of keys in his hand, for without such a talisman he would fear that some devil might take advantage of his weak state to slip into his body.
—The Golden Bough, Sir James George Frazer
KAB = axA.xB mod q
= yAxB mod q (which B can compute)
= yBxA mod q (which A can compute)
Pm+kPb–nB(kG) = Pm+k(nBG)–nB(kG) = Pm