Lecture 05
Lecture 05
Lecture 05
Security
Fifth Edition
by William Stallings
Chapter 9
Public Key Cryptography and RSA
Private-Key Cryptography
c = 0; f = 1
for i = k downto 0
do c = 2 x c
f = (f x f) mod n
if bi == 1 then
c = c + 1
f = (f x a) mod n
return f
Efficient Encryption
• have considered:
• principles of public-key cryptography
• RSA algorithm, implementation, security
Timing Attacks
Chapter 10
Public Key Cryptosystems
Diffie-Hellman Key Exchange
• have considered:
• Diffie-Hellman key exchange
• ElGamal cryptography
• Elliptic Curve cryptography
• Pseudorandom Number Generation (PRNG) based on Asymmetric Ciphers
(RSA & ECC)