Académique Documents
Professionnel Documents
Culture Documents
Contd.
Step 1: The most common ones have the property that Alice and Bob
each own two keys, one for encryption and one for decryption
Step 2: Alice publish a public key to send her a message. And has a
private key to decrypt it.
Step 3: Now Bob send Alice a message using the public key and Alice
decrypt it using her private key.
KEY TERMS
Cipher text:
This is the scrambled message produced as output. It depends on the
plaintext and the key. For a given message, two different keys will produce
two different cipher texts.
A GENERAL APPROACH
Contd.
Step 1 : Each user generates a pair of keys to be used for the encryption
and decryption of messages.
There is some source A that produces a message in plaintext, X =[X1, X2,..., XM,]. The
M elements of X are letters in some finite alphabet. The message is intended for
destination B. B generates a related pair of keys: a public key, PUb, and a private key,
PRb. PRb is known only to B, whereas PUb is publicly available.
A generates another pair of keys: a public key, PUa, and a private key, PRa. PRa is
known only to A, whereas PUa is publicly available.
Contd.
Authentication & security: Secrecy
Contd.
Secrecy in a public key encryption :
Step 1: A encrypt the massage using Bs public key PUb and send it to B.
With the message X and the encryption key PUb as input, A forms
the cipher text Y = [Y1, Y2,..., YN]:
Step 2: B decrypt the massage using its private key PRb. Using its
private key PRb and the cipher text Y it obtain the original
massage X
Authentication & security: Authentication
Contd.
Authentication in a public key encryption :
Step 2: B can decrypt the message using A's public key. Because
the message was encrypted using A's private key, only A
could have prepared the message.
Comparing Secrecy and Authentication
Contd.
In this case, we begin as before by encrypting a message, using
the sender's private key. This provides the digital signature.
Next, we encrypt again, using the receiver's public key. The
final cipher text can be decrypted only by the intended receiver,
who alone has the matching private key. Thus, confidentiality is
provided. The disadvantage of this approach is that the public-
key algorithm, which is complex, must be exercised four times
rather than two in each communication.
DIGITAL SIGNATURE