Public key cryptography – asymmetric
Public key cryptography – asymmetric
plan
- Abstract
- Introduction
- History of Public key cryptography
- Definition of Public key cryptography
- The essential principles
1.1. Its Advantages1.2. One-way functions
- Computationally one-way function
- Computationally one-way trapdoor function
- RSA Encryption
- RSA Encryption – The Mathematics
- Key exchange
- Key Exchange – RSA Encryption
- RSA – Man-in-the-middle
- the discrete logarithm problem
2. The electronic signature (digital signature)
- RSA – Digital Signature
- 2.1 the chinese remainder theorem
- 2.2 euler formula and roots modulo pq
3. Public key infrastructures
- *Infrastructure models
- *Hierarchical model
- *Hierarchical model – X.509v3 certificates
- *Hierarchical model – CA certificate
- *Hierarchical model – Client certificate
- *Hierarchical model – Identification
- *Hierarchical model – The hierarchy
- *Hierarchical model – Certificate chain
- *Hierarchical Model – Issues
- *Network of trust model
- *Network of Trust Model – Issues
- Elliptic-Curve Cryptosystem
- High performance cryptographic systems (key lengths)
- ElGamal Cryptosystem
- Encryption and signature algorithm based on the problem of the discrete logarithm.
- DSA – Digital Signature Algorithm
- American standard based on a variant of ElGamal
- Rabin's Cryptosystem
- Paillier Cryptosystem
- Probabilistic public key cryptography
- Zero-knowledge proofs algorithms
- the pohlig hellman algorithm
- DH Key Exchange – The Math
- DH – Man-in-the-middle
6. symmetric vs asymmetric key encryption
c'est ok , mais il faut prendre en considération le faite que vous n'avez pas beaucoup de temps, il faut se limiter donc au plus important .
RépondreSupprimerAllah Aysahale