Lecture 2: Public-key Cryptography

Lecture 2: Public-key Cryptography

Public-key cryptography - How does it work? - Public and private keys - One-way functions

Public Key, Cryptography And Oneway Functions

The Caesar Cipher

C: Decryption Function

The Kerckhoff Principle

Known Plaintext Attack

How Cryptographic Systems Can Be Broken

To Prove Who We Are

An Insecure Channel

A Symmetric Key

Tehnician: Private Keys

Using Public Key Cryptography

Public And Private Key Pairs

Asymmetric Key Exchange

Tehnician: Web Of Trust

Cryptography And Public Key Cryptography