Loading...
Please wait, while we are loading the content...
Similar Documents
Public-key cryptosystems based on factoring
| Content Provider | Scilit |
|---|---|
| Author | McAndrew, Alasdair |
| Copyright Year | 2016 |
| Description | Recall that a public-key cryptosystem is a cryptosystem with two distinct, but related keys. Each user of the cryptosystem has a public key, which he or she makes public, so that anyone else can use it to encrypt messages to the user. The user also has a private key, known to nobody else, which is used for decryption. To make the system secure, it is important that there is no easy way to determine a private key from the corresponding public key. To do this requires some nifty mathematics, as we shall see. Book Name: Introduction to Cryptography with Open-Source Software |
| Related Links | https://content.taylorfrancis.com/books/download?dac=C2009-0-02757-3&isbn=9780429094552&doi=10.1201/9781439825716-7&format=pdf |
| Ending Page | 138 |
| Page Count | 26 |
| Starting Page | 113 |
| DOI | 10.1201/9781439825716-7 |
| Language | English |
| Publisher | Informa UK Limited |
| Publisher Date | 2016-04-19 |
| Access Restriction | Open |
| Subject Keyword | Book Name: Introduction To Cryptography with Open-source Software Information Systems Mathematics Encrypt Public Key Messages Corresponding Key Cryptosystems Distinct |
| Content Type | Text |
| Resource Type | Chapter |