Cryptography

- Forms of attack:
- ciphertext-only
known-plaintext
chosen-plaintext
Forms of Cryptosystems
- Private Key:
- A single key is used for both encryption and decryption.
Key distribution problem - a secure channel is needed to transmit
the key before secure communication can take place over an unsecure
channel.
- Public Key:
- The encryption procedure (key) is public while the decryption
procedure (key) is private.
Requirements:
- For every message M, D(E(M)) = M
- E and D can be efficiently applied to M
- It is impractical to derive D from E.
Go Back to the Operating Systems page.