Public-Key Cryptography - TLS Cryptography In-Depth

  • Contact Us

Projective coordinates

Preliminaries – Public-Key Cryptography

2024-08-30 Angela Mandeville 0

7.1 Preliminaries Recall our earlier definition of a symmetric cryptosystem from Chapter 4, Encryption and Decryption. A symmetric cryptosystem has the following ingredients: Instead of […]

Security of Diffie-Hellman key exchange – Public-Key Cryptography

2024-04-16 Angela Mandeville 0

7.4 Security of Diffie-Hellman key exchange The security of the Diffie-Hellman protocol relies on the following three assumptions: We will discuss each of these assumptions […]

The RSA algorithm – Public-Key Cryptography

2023-12-15 Angela Mandeville 0

7.7 The RSA algorithm The RSA algorithm is named after its inventors, Ron Rivest, Adi Shamir, and Len Adleman (see Chapter 1, The Role of […]

Security of the RSA algorithm – Public-Key Cryptography

2023-07-02 Angela Mandeville 0

7.8 Security of the RSA algorithm The security of the RSA algorithm relies on the following three assumptions: We will discuss each of these assumptions […]

The Station-to-Station (STS) protocol 2 – Public-Key Cryptography

2023-03-18 Angela Mandeville 0

If the signature verification is successful, Alice generates her own signature sigA(h(gα|gβ)), encrypts it using the shared secret key K, and sends the result to […]

Public-key cryptography in TLS 1.3 – Public-Key Cryptography

2023-01-30 Angela Mandeville 0

7.10 Public-key cryptography in TLS 1.3 Equipped with the mathematical background on public-key cryptography, we can now explore how it is applied in TLS 1.3. […]

Finite Field Diffie-Hellman in TLS – Public-Key Cryptography

2022-10-11 Angela Mandeville 0

7.10.3 Finite Field Diffie-Hellman in TLS When finite field groups are used, server Alice and client Bob execute the conventional Diffie-Hellman key agreement protocol as […]

What are elliptic curves? – Elliptic Curves

2022-03-31 Angela Mandeville 0

8.1 What are elliptic curves? Historically, elliptic curves are rooted in so-called Diophantine equations, named after ancient Greek mathematician Diophantus of Alexandria. Diophantine equations are […]

Projective coordinates – Elliptic Curves

2021-11-11 Angela Mandeville 0

8.1.3 Projective coordinates In order to get to grips with the mysterious point at infinity O, we need to extend the set of points that […]

Elliptic curves as abelian groups – Elliptic Curves

2021-09-30 Angela Mandeville 0

8.2 Elliptic curves as abelian groups Two points P and Q on a smooth elliptic curve E in reduced Weierstrass form can be added to […]

Posts pagination

1 2 »

Archives

  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • August 2023
  • July 2023
  • May 2023
  • March 2023
  • January 2023
  • December 2022
  • October 2022
  • August 2022
  • May 2022
  • March 2022
  • February 2022
  • November 2021
  • September 2021
  • July 2021
  • June 2021
  • April 2021
  • February 2021
  • January 2021
June 2025
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
30  
« Aug    

Categories

  • Authenticity of public keys
  • Certification Exams of IT
  • Elliptic curves over finite fields
  • IT Certification Exams
  • Key pair generation
  • Projective coordinates
  • Security of the RSA algorithm

Copyright © 2025 | WordPress Theme by atkinswill