Advertisement

Asymmetric Key Cryptography

Abstract

This chapter continues our discussion of cryptography by examining asymmetric key cryptography. In the previous chapter, we covered symmetric key cryptography. The problem with symmetric key cryptography is that any two parties that want to exchange confidential information with each other need to agree on a key beforehand. Alice needs to somehow tell Bob the key in order for him to decrypt a message that she sends him. Alice and Bob could meet in person to agree on a key—but this is not usually possible in an Internet transaction. How should they agree upon a key?

Keywords

Certificate Authority Elliptic Curve Cryptography Elliptic Curve Discrete Logarithm Problem Asymmetric Cryptography Certificate Revocation List 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Neil Daswani, Christoph Kern, and Anita Kesavan 2007

Personalised recommendations