06: Public-key cryptography

Public-key cryptography. Key agreement. The Diffie-Hellman key agreement protocol. Elliptic curve cryptography. Ephemeral keys. ECDHE key agreement.

Symmetric Key Cryptography (secret key)

  • do key = undo key

  • eve shouldn't be able to guess k at all

How does Alice communicate k to Bob while keeping it secret from Eve?

Ralph Merkle Puzzle:

  • alice makes moderately difficult puzzle, solved reveals independent random secret key k and ID
  • Alice repeats step1 to generate a set of n puzzles p1... pn, which will wolve to keys k1... kn and IDs d1...dn
  • Puzzle set it sent to Bob, he randomly picks puzzle pi and solves it --> ki and di
  • Bob sends ID di to Alice
  • Alice and Bob communicate securly with ki
  • but how's this practical and prevent eve from guessing ki?

Asymmetric(Public) Key Cryptography (private Key)

  • Key Pair:

    • do = PU
    • undo = PR (can't guess, and can't recover w\/ PU)
  • alice, eve, bob = PU; bob = PR

  • applications:

    • Encryption\/decryption(e.g.,R.SA)

    • Keyagreement\/exchange (e.g., Diffie-Hellman: DHE, ECDHE, etc)

    • Digital signatures(e.g., RSA, Elgamal, DSA, ECDSA, etc)

    • Advanced: secure\/homomorphic computation, zero-knowledge proofs, etc

results matching ""

    No results matching ""