Basic HTML version of Foils prepared July 6 99

Foil 20 Public Key Cryptography (2)

From Security Infrastructure fo Electronic Commerce and Internet CPS714 Computational Science Information Track -- June 2 and June 7 99. by Roman Markowski


1 Asymmetric (public-key) Cryptography
  • adding Confidentiality; 2 keys mathematically linked: public and private keys (RSA, DH)
  • either can be used for encryption /decryption
  • problem: computationally intensive
2 Recipient's
3 Public Key
4 Cleartext
5 message
6 Cleartext
7 message
8 Encrypt
9 Decrypt
10 Recipient's
11 Private key

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Tue Jul 6 1999