5.2. Secure Transmission of Messages

Consider the standard scenario: a party named Alice, and called sender, is willing to send a secret message m to a party named Bob, and called receiver or recipient, over a public communication channel. A third party Carol may intercept and read the message. In order to maintain the secrecy of the message, Alice uses a well-defined transform fe to convert the plaintext message m to the ciphertext message c and sends c to Bob. Bob possesses some secret information with the help of which he uses the reverse transformation fd in order to get back m. Carol who is expected not to know the secret information cannot retrieve m from c by applying the transformation fd.

In a public-key system, the realization of the ...

Get Public-key Cryptography: Theory and Practice now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.