CHAPTER 10
Other Public-Key Cryptosystems
10.1 Diffie–Hellman Key Exchange
10.2 ElGamal Cryptographic System
10.3 Elliptic Curve Arithmetic
Elliptic Curves over Real Numbers
10.4 Elliptic Curve Cryptography
Analog of Diffie–Hellman Key Exchange
Elliptic Curve Encryption/Decryption
Security of Elliptic Curve Cryptography
LEARNING OBJECTIVES
After studying this chapter, you should be able to:
- ◆ Define Diffie–Hellman key exchange.
- ◆ Understand the man-in-the-middle attack.
- ◆ Present an overview of the ElGamal cryptographic system.
- ◆ Understand elliptic curve ...
Get Cryptography and Network Security Principles and Practice, 8th Edition - Pearson now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.