Abstract
Think about any of the cryptosystems presented in Chapter 1, or any other similar systems. There will be no difficulties in the decryption process for a cryptanalyst who has learned the encryption method. The encryption and decryption keys coincide even in such a sophisticated system as DES. So you give away your secrets if you work with one of the systems mentioned and publicize your encryption method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Salomaa, A. (1990). The Idea of Public Keys. In: Public-Key Cryptography. EATCS Monographs on Theoretical Computer Science, vol 23. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-02627-4_2
Download citation
DOI: https://doi.org/10.1007/978-3-662-02627-4_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-02629-8
Online ISBN: 978-3-662-02627-4
eBook Packages: Springer Book Archive