Public-Key Cryptography - TLS Cryptography In-Depth

  • Contact Us

Preliminaries – Public-Key Cryptography

2024-08-30 Angela Mandeville 0

7.1 Preliminaries Recall our earlier definition of a symmetric cryptosystem from Chapter 4, Encryption and Decryption. A symmetric cryptosystem has the following ingredients: Instead of […]

Groups – Public-Key Cryptography

2024-07-08 Angela Mandeville 0

7.2 Groups Groups are the most basic mathematical structure in which public-key cryptography can take place. So, let’s plunge right into the math and explain […]

The discrete logarithm problem – Public-Key Cryptography

2024-06-06 Angela Mandeville 0

7.2.2 The discrete logarithm problem If g is an element of a group 𝔾 with operation ⋆, we can define powers of g by writing […]

The Diffie-Hellman key-exchange protocol – Public-Key Cryptography

2024-05-10 Angela Mandeville 0

7.3 The Diffie-Hellman key-exchange protocol Alice and Bob communicate over an insecure channel. They can establish a shared secret K using the following protocol steps […]

Security of Diffie-Hellman key exchange – Public-Key Cryptography

2024-04-16 Angela Mandeville 0

7.4 Security of Diffie-Hellman key exchange The security of the Diffie-Hellman protocol relies on the following three assumptions: We will discuss each of these assumptions […]

Authenticity of public keys – Public-Key Cryptography

2024-03-12 Angela Mandeville 0

7.4.3 Authenticity of public keys If Alice and Bob do not ensure that their public keys are authentic or do not verify their respective identities, […]

Finite fields – Public-Key Cryptography

2024-02-05 Angela Mandeville 0

7.6 Finite fields Fields are mathematical structures in which the basic arithmetic rules that we are used to hold true: in a field, we can […]

Fields of order pk – Public-Key Cryptography

2024-01-20 Angela Mandeville 0

7.6.2 Fields of order pk Are there any other finite fields than 𝔽p? It seems that the requirements that the order of the field must […]

The RSA algorithm – Public-Key Cryptography

2023-12-15 Angela Mandeville 0

7.7 The RSA algorithm The RSA algorithm is named after its inventors, Ron Rivest, Adi Shamir, and Len Adleman (see Chapter 1, The Role of […]

Key pair generation – Public-Key Cryptography

2023-11-11 Angela Mandeville 0

7.7.2 Key pair generation Alice generates her RSA key pair with the following steps: as a public key. Keep the number secret, along with p,q, […]

Posts pagination

1 2 3 »

Archives

  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • August 2023
  • July 2023
  • May 2023
  • March 2023
  • January 2023
  • December 2022
  • October 2022
  • August 2022
  • May 2022
  • March 2022
  • February 2022
  • November 2021
  • September 2021
  • July 2021
  • June 2021
  • April 2021
  • February 2021
  • January 2021
May 2025
M T W T F S S
 1234
567891011
12131415161718
19202122232425
262728293031  
« Aug    

Categories

  • Authenticity of public keys
  • Certification Exams of IT
  • Elliptic curves over finite fields
  • IT Certification Exams
  • Key pair generation
  • Projective coordinates
  • Security of the RSA algorithm

Copyright © 2025 | WordPress Theme by atkinswill