Basic HTML version of Foils prepared May 30 99

Foil 13 Authentication with public key Cryptography

From Basic Mathematics of Security Systems CPS714 Computational Science Information Track -- June 2 99. by Geoffrey C. Fox


Here A chooses a challenge -- a random number r and can verify that B is at other end using solely public information!
A Sends x
Decrypt x with dB and send back challenge
A Encrypts r using eB to give x
Send r
Only B could have sent back r
Alice is A
Bob is B
eB is public key of B
dB is B's private key



© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Sun May 30 1999