Chapter 14: 1
Computer Security 3e
Dieter Gollmann
Security.di.unimi.it/sicurezza1516/
Computer Security 3e Dieter Gollmann - - PowerPoint PPT Presentation
Computer Security 3e Dieter Gollmann Security.di.unimi.it/sicurezza1516/ Chapter 14: 1 Chapter 1: Cryptography Chapter 14: 2 Cryptography Cryptography is the science and study of secret writing. Cryptanalysis is the science and study
Chapter 14: 1
Security.di.unimi.it/sicurezza1516/
Chapter 14: 2
Chapter 14: 3
Chapter 14: 4
A l i c e
Bob
Two secure end systems communicate over an insecure channel The enemy is an
to traffic
Chapter 14: 5
Chapter 14: 6
Chapter 14: 7
Chapter 14: 8
Chapter 14: 9
Chapter 14: 10
algorithms is today the norm.
Chapter 14: 11
Chapter 14: 12
Chapter 14: 13
Chapter 14: 14
Chapter 14: 15
Chapter 14: 16
Chapter 14: 17
Chapter 14: 18
Chapter 14: 19
Chapter 14: 20
Chapter 14: 21
Chapter 14: 22
Chapter 14: 23
Chapter 14: 24
set of values (xi,hk(xi)), it is computationally infeasible to compute hk(x) for any new input x.
Chapter 14: 25
Chapter 14: 26
Chapter 14: 27
Chapter 14: 28
Chapter 14: 29
Chapter 14: 30
gcd(d,q-1) = 1.
1 mod lcm(p-1,q-1) .
Chapter 14: 31
Chapter 14: 32
smaller values for verification than for signing; in such cases a ‘small’ public key had been used.
Chapter 14: 33
Chapter 14: 34
the secret.
Chapter 14: 35
Chapter 14: 36
Chapter 14: 37
Chapter 14: 38
Chapter 14: 39
Chapter 14: 40
Chapter 14: 41
Chapter 14: 42
Chapter 14: 43
Chapter 14: 44
Chapter 14: 45
Chapter 14: 46
gcd(e,p-1) = 1 and gcd(e,q-1) = 1.
e d = 1 mod lcm(p-1,q-1) .
Chapter 14: 47
Chapter 14: 48