Algorithms and Protocols:
The partners share a secret (the key) used to encrypt and decrypt the messages.
Simple Example -- the XOR algorithm
Analysis;
Real examples:
Each partner has two keys: one public and one private. A message encrypted with one key can be decrypted only with the other.
Example:
Problems with the Public Key Algorithms:
Example: RSA Algorithm (Ron Rivest, Adi Shamir, Leonard Adleman)
The idea is that two partners, communicating through an unsecure channel, can create an information that is known by both and cannot be determined by a third party.
Example: Diffie-Hellman Key Exchange Protocol
The purpose is to generate a digest of a message that has the following properties:
Examples: