Public Key Cryptography
Using public key encryption we use two keys
rather than just one.
- The public key, E, may be openly published.
- The private key, D, is known only by the intended recipient.
The plan is to choose keys such that even knowing the public key does not
reveal the private key:
- A and B openly publish their public keys (viewed as algorithms)
EA and EB.
- A sends EB( Plaintextmessage ) to B.
- B calculates DB( EB( Plaintextmessage ) ) = Plaintextmessage.
- B can then reply with EA( Plaintextreply )
for A to read.
CITS3002 Computer Networks, Lecture 12, Cryptography's role in networking, p13, 22nd May 2024.
|