Basic HTML version of Foils prepared
July 6 99
Foil 20 Public Key Cryptography (2)
From
Security Infrastructure fo Electronic Commerce and Internet CPS714 Computational Science Information Track --
June 2 and June 7 99
.
by
Roman Markowski
1
Asymmetric (public-key) Cryptography
adding Confidentiality; 2 keys mathematically linked: public and private keys (RSA, DH)
either can be used for encryption /decryption
problem: computationally intensive
2
Recipient's
3
Public Key
4
Cleartext
5
message
6
Cleartext
7
message
8
Encrypt
9
Decrypt
10
Recipient's
11
Private key
in Table To:
©
Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu
If you have any comments about this server, send e-mail to
webmaster@npac.syr.edu
.
Page produced by
wwwfoil
on Tue Jul 6 1999