Documente Academic
Documente Profesional
Documente Cultură
m K (.)
S
KS(m ) KS(m )
KS( ) . m
+ Internet - KS
KS
+.
K ()
B + +
- .
KB ( )
KB(KS ) KB(KS )
+ -
KB
KB
Alice:
generates random symmetric private key, KS.
encrypts message with KS (for efficiency)
also encrypts KS with Bob’s public key.
sends both KS(m) and KB(KS) to Bob.
(Copied from Dr. Chang’s lecture.)
Secure e-mail
Alice wants to send confidential e-mail, m, to Bob.
KS
m K (.)
S
KS(m ) KS(m )
KS( ) . m
+ Internet - KS
KS
+.
K ()
B + +
- .
KB ( )
KB(KS ) KB(KS )
+ -
KB
KB
Bob:
uses his private key to decrypt and recover KS
uses KS to decrypt KS(m) to recover m
- KA
+
KA
- -
m .
H( )
-.
K ()
A
KA(H(m)) KA(H(m)) + .
KA ( )
H(m )
+ Internet - compare
m H( ). H(m )
m
+ KS( ) .
m + Internet
KS
+
KB ( )
. +
KB(KS )
+
KB