130 likes | 215 Views
Learn about Public Key Cryptography, RSA, Elliptic Curve algorithms, Diffie-Hellman, DSS, Birthday Attacks, Hash Codes, and Block Chaining for secure data transmission.
E N D
CSE 5/7353 – February 1st 2006 Public Key Cryptography
Keys • Public Key • Private Key
Uses • Y = E (Pub , X) • X = D(PRb, Y)
Uses • Y = E (PRa , X) • X = D(PUa, Y)
Uses • Z = E (PRb, E((PRa , X)) • X = D(PUa, D(PRa, Y)
Algorithms • RSA • Elliptic Curve • Diffie-Hellman • DSS
Hashes • Calculate hash code • Encrypt Hash Code for Authentication. • Message Example