密码学基础(05) Message authentication and Hash function 復大辱软件学院
1 密码学基础(05) Message authentication and Hash function
Review Symmetric Cryptography Asymmetric Cryptography 復大辱软件学院
2 Review • Symmetric Cryptography • Asymmetric Cryptography
o Review: Symmetric Model Secret key shared by Secret key shared by sender and recipient sender and recipient Transmitted ciphertext Plaintext Plaintext Input Encryption algorithm Decryption algorithm output (e.g, DES) (reverse of encryption algorithm) Bob Alice 3 復大辱软件学院 LiST
LiJT 3 Review: Symmetric Model Bob Alice
Asymmetric Model B oDS S public key ring Ted Mike Alice Alice's public Alices private k key 圄「 Transmitted cipherte Plaintext Plaintext Input Encryption algorithm Decryption algorithm output (e. g, RSA) (reverse of encryption algorithm) Bob Alice 復大辱软件学院 LiJT
LiJT 4 Asymmetric Model Bob Alice
Review Confidentiality 復大辱软件学院
5 Review • Confidentiality