tailieunhanh - Lecture Data security and encryption - Lecture 32: Review 16-30

The contents of this chapter include all of the following: RSA, RSA En/decryption, Diffie-Hellman key exchange, man-in-the-middle attack, ElGamal cryptography, ElGamal message exchange, hash function, secure hash algorithm, SHA-3 requirements,. | Data Security and Encryption (CSE348) 1 1 Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Revision Lectures 16-30 2 2 RSA RSA is the best known, and by far the most widely used general public key encryption algorithm First published by Rivest, Shamir & Adleman of MIT in 1978 [RIVE78] The Rivest-Shamir-Adleman (RSA) scheme has since that time ruled supreme as the most widely accepted Implemented general-purpose approach to public-key encryption 3 3 RSA is the best known, and by far the most widely used general public key encryption algorithm, and was first published by Rivest, Shamir & Adleman of MIT in 1978 [RIVE78]. The Rivest-Shamir-Adleman (RSA) scheme has since that time reigned supreme as the most widely accepted and implemented general-purpose approach to public-key encryption. It is based on exponentiation in a finite (Galois) field over integers modulo a prime, using large integers (eg. 1024 bits). Its security is due to the cost of factoring large numbers. RSA It is based on exponentiation in a finite (Galois) field over integers modulo a prime, using large integers (eg. 1024 bits) Its security is due to the cost of factoring large numbers 4 4 RSA is the best known, and by far the most widely used general public key encryption algorithm, and was first published by Rivest, Shamir & Adleman of MIT in 1978 [RIVE78]. The Rivest-Shamir-Adleman (RSA) scheme has since that time reigned supreme as the most widely accepted and implemented general-purpose approach to public-key encryption. It is based on exponentiation in a finite (Galois) field over integers modulo a prime, using large integers (eg. 1024 bits). Its security is due to the cost of factoring large numbers. RSA By Rivest, Shamir & Adleman of MIT in 1977 Best known & widely used public-key scheme based on exponentiation in a finite (Galois) . | Data Security and Encryption (CSE348) 1 1 Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Revision Lectures 16-30 2 2 RSA RSA is the best known, and by far the most widely used general public key encryption algorithm First published by Rivest, Shamir & Adleman of MIT in 1978 [RIVE78] The Rivest-Shamir-Adleman (RSA) scheme has since that time ruled supreme as the most widely accepted Implemented general-purpose approach to public-key encryption 3 3 RSA is the best known, and by far the most widely used general public key encryption algorithm, and was first published by Rivest, Shamir & Adleman of MIT in 1978 [RIVE78]. The Rivest-Shamir-Adleman (RSA) scheme has since that time reigned supreme as the most widely accepted and implemented general-purpose approach to public-key encryption. It is based on exponentiation in a .