Public key cryptography – asymmetric

 Public key cryptography – asymmetric

plan

  • Abstract

  •  Introduction

  • History of Public key cryptography 
  • Definition of Public key cryptography 

  1. The essential principles

      1.1. Its Advantages

      1.2. One-way functions

  •          Computationally one-way function
  •          Computationally one-way trapdoor function
      1.3. First public key algorithm – RSA
  •          RSA Encryption 
  •          RSA Encryption – The Mathematics
  •          Key exchange
  •          Key Exchange – RSA Encryption
      1.4. Public key cryptography has its problems
  •            RSA – Man-in-the-middle
  •            the discrete logarithm problem

     2. The electronic signature  (digital signature)

  •          RSA – Digital Signature
  • 2.1 the chinese remainder theorem
  • 2.2 euler formula and roots modulo pq

     3.  Public key infrastructures

  •          *Infrastructure models
  •           *Hierarchical model
  •            *Hierarchical model – X.509v3 certificates
  •            *Hierarchical model – CA certificate
  •            *Hierarchical model – Client certificate
  •            *Hierarchical model – Identification
  •            *Hierarchical model – The hierarchy
  •            *Hierarchical model – Certificate chain
  •            *Hierarchical Model – Issues
  •            *Network of trust model
  •            *Network of Trust Model – Issues
       4. Notions in bulk – Nearly 30 years of research
  •              Elliptic-Curve Cryptosystem
  •               High performance cryptographic systems (key lengths)
  •               ElGamal Cryptosystem
  •               Encryption and signature algorithm based on the problem of the discrete logarithm.
  •               DSA – Digital Signature Algorithm
  •               American standard based on a variant of ElGamal
  •               Rabin's Cryptosystem
  •               Paillier Cryptosystem
  •               Probabilistic public key cryptography
  •               Zero-knowledge proofs algorithms
  •               the pohlig hellman algorithm

      5. Key Exchange – Diffie-Hellman
  • DH Key Exchange – The Math
  • DH – Man-in-the-middle
6. symmetric vs asymmetric key encryption

     7. its applications ( Cryptography – but where? )

8.  the contribution of public key is in cyber security
  •  Conclusion 
  •  References


Commentaires

  1. c'est ok , mais il faut prendre en considération le faite que vous n'avez pas beaucoup de temps, il faut se limiter donc au plus important .
    Allah Aysahale

    RépondreSupprimer

Enregistrer un commentaire

Articles les plus consultés