Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

A Brief History of Cryptology and Cryptographic AlgorithmsAlice and Bob and Whit and Martin: Public Key Crypto

A Brief History of Cryptology and Cryptographic Algorithms: Alice and Bob and Whit and Martin:... [The keyexchange problem occurs with symmetric cipher systems because the same key is used for both enciphering and deciphering messages. This means that both the sender and receiver must have the same key and it must be distributed to them via a secure method. While this is merely inconvenient if there are only two correspondents, if there are tens or hundreds of people exchanging secret messages, then distributing keys is a major issue. Public-key cryptography eliminates this problem by mathematically breaking the key into two parts, a publickey and a privatekey. The public key is published and available to anyone who wants to send a message and the private key is the only key that can successfully decipher a message enciphered with a particular public key. This chapter investigates the mechanisms used to implement public-key cryptography.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

A Brief History of Cryptology and Cryptographic AlgorithmsAlice and Bob and Whit and Martin: Public Key Crypto

Loading next page...
 
/lp/springer-journals/a-brief-history-of-cryptology-and-cryptographic-algorithms-alice-and-3rB4nCjv1X

References (4)

Publisher
Springer International Publishing
Copyright
© The Author(s) 2013
ISBN
978-3-319-01627-6
Pages
87 –96
DOI
10.1007/978-3-319-01628-3_9
Publisher site
See Chapter on Publisher Site

Abstract

[The keyexchange problem occurs with symmetric cipher systems because the same key is used for both enciphering and deciphering messages. This means that both the sender and receiver must have the same key and it must be distributed to them via a secure method. While this is merely inconvenient if there are only two correspondents, if there are tens or hundreds of people exchanging secret messages, then distributing keys is a major issue. Public-key cryptography eliminates this problem by mathematically breaking the key into two parts, a publickey and a privatekey. The public key is published and available to anyone who wants to send a message and the private key is the only key that can successfully decipher a message enciphered with a particular public key. This chapter investigates the mechanisms used to implement public-key cryptography.]

Published: Sep 25, 2013

Keywords: Secret Message; Insecure Channel; Symmetric Cipher; Cipher System

There are no references for this article.