Part Three: Asymmetric Ciphers

CHAPTER 9

Public-Key Cryptography and RSA

 

 

LEARNING OBJECTIVES

After studying this chapter, you should be able to:

  • ◆ Present an overview of the basic principles of public-key cryptosystems.
  • ◆ Explain the two distinct uses of public-key cryptosystems.
  • ◆ List and explain the requirements for a public-key cryptosystem.
  • ◆ Present an overview of the RSA algorithm.
  • ◆ Understand the timing attack. ...

Get Cryptography and Network Security Principles and Practice, 8th Edition - Pearson now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.