Public-Key Cryptography - TLS Cryptography In-Depth

  • Contact Us

Authenticity of public keys

Preliminaries – Public-Key Cryptography

2024-08-30 Angela Mandeville 0

7.1 Preliminaries Recall our earlier definition of a symmetric cryptosystem from Chapter 4, Encryption and Decryption. A symmetric cryptosystem has the following ingredients: Instead of […]

Groups – Public-Key Cryptography

2024-07-08 Angela Mandeville 0

7.2 Groups Groups are the most basic mathematical structure in which public-key cryptography can take place. So, let’s plunge right into the math and explain […]

Finite fields – Public-Key Cryptography

2024-02-05 Angela Mandeville 0

7.6 Finite fields Fields are mathematical structures in which the basic arithmetic rules that we are used to hold true: in a field, we can […]

Fields of order pk – Public-Key Cryptography

2024-01-20 Angela Mandeville 0

7.6.2 Fields of order pk Are there any other finite fields than 𝔽p? It seems that the requirements that the order of the field must […]

The RSA algorithm – Public-Key Cryptography

2023-12-15 Angela Mandeville 0

7.7 The RSA algorithm The RSA algorithm is named after its inventors, Ron Rivest, Adi Shamir, and Len Adleman (see Chapter 1, The Role of […]

Key pair generation – Public-Key Cryptography

2023-11-11 Angela Mandeville 0

7.7.2 Key pair generation Alice generates her RSA key pair with the following steps: as a public key. Keep the number secret, along with p,q, […]

Supported groups – Public-Key Cryptography

2022-12-29 Angela Mandeville 0

7.10.2 Supported groups When client Bob starts a TLS handshake with server Alice and wishes to use the ECDHE or DHE key agreement protocol, he […]

Finite Field Diffie-Hellman in TLS – Public-Key Cryptography

2022-10-11 Angela Mandeville 0

7.10.3 Finite Field Diffie-Hellman in TLS When finite field groups are used, server Alice and client Bob execute the conventional Diffie-Hellman key agreement protocol as […]

Hybrid encryption – Public-Key Cryptography

2022-08-02 Angela Mandeville 0

7.11.2 Hybrid encryption A hybrid encryption scheme is a specific type of hybrid cryptosystem that allows Alice and Bob to securely encrypt data they want […]

Elliptic curves as abelian groups – Elliptic Curves

2021-09-30 Angela Mandeville 0

8.2 Elliptic curves as abelian groups Two points P and Q on a smooth elliptic curve E in reduced Weierstrass form can be added to […]

Posts pagination

1 2 »

Archives

  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • August 2023
  • July 2023
  • May 2023
  • March 2023
  • January 2023
  • December 2022
  • October 2022
  • August 2022
  • May 2022
  • March 2022
  • February 2022
  • November 2021
  • September 2021
  • July 2021
  • June 2021
  • April 2021
  • February 2021
  • January 2021
June 2025
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
30  
« Aug    

Categories

  • Authenticity of public keys
  • Certification Exams of IT
  • Elliptic curves over finite fields
  • IT Certification Exams
  • Key pair generation
  • Projective coordinates
  • Security of the RSA algorithm

Copyright © 2025 | WordPress Theme by atkinswill