Basic HTML version of Foils prepared May 30 99

Foil 20 Combining Public and Secret Keys

From Basic Mathematics of Security Systems CPS714 Computational Science Information Track -- June 2 99. by Geoffrey C. Fox


So one can take advantage of both security approaches by using Public Key Infrastructure to initialize a session
  • One participant chooses a random secret key
  • This is encrypted using public key of recipient
  • recipient decodes this digital envelope with his or her private key
Thereby they have set up joint knowledge of a secret key without usual disadvantages
  • secret key is used for rest of session
Note secret key is only used for this session and so one must break in real time



© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Sun May 30 1999