Documente Academic
Documente Profesional
Documente Cultură
Legal stuff
Contents
Contents
Contents
Two properties of symmetric (secret-key) cryptosystems:
Alice or Bob can cheat each other, because they have identical keys.
Example: Alice can claim that she never ordered a TV on-line from Bob (he
could have fabricated her order). To prevent this: non-repudiation
Contents
10
11
13
14
15
Contents
18
19
20
21
22
23
24
25
Eulers Theorem
26
Contents
27
28
29
Key Generation
30
31
Contents
32
Implementation aspects
33
Square-and-Multiply
34
Example: Square-and-Multiply
35
36
Contents
37