代写代考 CSE 127: Introduction to Security

CSE 127: Introduction to Security
Public-Key Cryptography

UCSD Winter 2022

Copyright By PowCoder代写 加微信 powcoder

Slides adapted from

► Key Exchange
► Public Key Encryption ► Digital Signatures

Asymmetric cryptography/public-key cryptography
Main insight: Separate keys for different operations.
Keys come in pairs, and are related to each other by the specific
► Public key: used to encrypt or verify signatures ► Private key: used to decrypt and sign

Public-key encryption
► Encryption: (public key, plaintext) → ciphertext Encpk(m) = c
► Decryption: (secret key, ciphertext) → plaintext Decsk(c) = m
Properties:
► Encryption and decryption are inverse operations:

Public-key encryption
► Encryption: (public key, plaintext) → ciphertext Encpk(m) = c
► Decryption: (secret key, ciphertext) → plaintext Decsk(c) = m
Properties:
► Encryption and decryption are inverse operations:
Decsk (Encpk (m)) = m
Secrecy: ciphertext reveals nothing about plaintext ► Computationally hard to decrypt without secret key
► The point:
► Anybody with your public key can send you a secret message! Solves key distribution problem.

Modular Arithmetic Review
Division: Let n,d,q,r be integers.
n = qd + r
0≤rCS代考 加微信: powcoder QQ: 1823890830 Email: powcoder@163.com