CITS3002 Computer Networks  
prev
next CITS3002 help3002 CITS3002 schedule  

Public Key Cryptography

Using public key encryption we use two keys rather than just one.

  • The public key, E, may be openly published.

  • The private key, D, is known only by the intended recipient.

The plan is to choose keys such that even knowing the public key does not reveal the private key:

  • A and B openly publish their public keys (viewed as algorithms) EA and EB.

  • A sends EB( Plaintextmessage ) to B.

  • B calculates DB( EB( Plaintextmessage ) ) = Plaintextmessage.

  • B can then reply with EA( Plaintextreply ) for A to read.




CITS3002 Computer Networks, Lecture 12, Cryptography's role in networking, p13, 22nd May 2024.