o Asymmetric Cipher Model Every body have two keys Public key—公开 Private key-保密 Bob Alice 復大辱软件学院 LiJT
LiJT 6 Bob Alice • Every body have two keys – Public key —— 公开 – Private key —— 保密 Asymmetric Cipher Model
o Asymmetric Cipher Model 公开 t Bob's Public key Alice's Public key Bob's private key Alice's Private key Bob Alice 復大辱软件学院 LiJT
LiJT 7 Bob Alice • Bob’s Public key Alice’s Public key • Bob’s Private key Alice’s Private key Asymmetric Cipher Model 公开
o Asymmetric Cipher Model 公开 t Bob's Public key Alice's Public key 保密 保密 Bob's Private key Aice's Private key Bob Alice 復大辱软件学院 LiJT
LiJT 8 Bob Alice • Bob’s Public key Alice’s Public key • Bob’s Private key Alice’s Private key Asymmetric Cipher Model 公开 保密 保密
o Asymmetric Cipher Model B oDS S public key ring Ted Mike Alice Alice's public Alices private k key 圄「 Transmitted cipherte Plaintext Plaintext Input Encryption algorithm Decryption algorithm output (e. g, RSA) (reverse of encryption algorithm) Bob Alice 9 復大辱软件学院 LiJT
LiJT 9 Asymmetric Cipher Model Bob Alice
o Cryptography Catalog The number of the keys used Symmetric, single-key, secret-key, conventional encryption: Both sender and receiver use the same key Asymmetric, two-key, or public-key encryption: the sender and receive each uses a different key 復大辱软件学院 LiST
LiJT 10 Cryptography Catalog • The number of the keys used – Symmetric , single-key, secret-key, conventional encryption: Both sender and receiver use the same key – Asymmetric, two-key, or public-key encryption: the sender and receive each uses a different key