Basic HTML version of Foils prepared May 30 99

Foil 20 Combining Public and Secret Keys

From Basic Mathematics of Security Systems CPS714 Computational Science Information Track -- June 2 99. by Geoffrey C. Fox


1 So one can take advantage of both security approaches by using Public Key Infrastructure to initialize a session
  • One participant chooses a random secret key
  • This is encrypted using public key of recipient
  • recipient decodes this digital envelope with his or her private key
2 Thereby they have set up joint knowledge of a secret key without usual disadvantages
  • secret key is used for rest of session
3 Note secret key is only used for this session and so one must break in real time

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Sun May 30 1999