Public-Key Cryptography - TLS Cryptography In-Depth

  • Contact Us

The encryption function – Public-Key Cryptography

2023-08-30 Angela Mandeville 0

7.7.3 The encryption function In order to send an encrypted message to Alice, Bob needs to obtain an authentic copy of Alice’s public key PKAlice […]

Security of the RSA algorithm – Public-Key Cryptography

2023-07-02 Angela Mandeville 0

7.8 Security of the RSA algorithm The security of the RSA algorithm relies on the following three assumptions: We will discuss each of these assumptions […]

Authenticity of public keys – Public-Key Cryptography

2023-05-20 Angela Mandeville 0

7.8.3 Authenticity of public keys Another way for Mallory to attack the RSA cryptoystem is to tamper with Alice’s public key. More specifically, Mallory might […]

The Station-to-Station (STS) protocol 2 – Public-Key Cryptography

2023-03-18 Angela Mandeville 0

If the signature verification is successful, Alice generates her own signature sigA(h(gα|gβ)), encrypts it using the shared secret key K, and sends the result to […]

The Station-to-Station (STS) protocol – Public-Key Cryptography

2023-03-16 Angela Mandeville 0

7.9.1 The Station-to-Station (STS) protocol A simple example that nicely illustrates fundamental design principles of an authenticated key agreement protocol is the Station-to-Station (STS) protocol […]

Public-key cryptography in TLS 1.3 – Public-Key Cryptography

2023-01-30 Angela Mandeville 0

7.10 Public-key cryptography in TLS 1.3 Equipped with the mathematical background on public-key cryptography, we can now explore how it is applied in TLS 1.3. […]

Supported groups – Public-Key Cryptography

2022-12-29 Angela Mandeville 0

7.10.2 Supported groups When client Bob starts a TLS handshake with server Alice and wishes to use the ECDHE or DHE key agreement protocol, he […]

Finite Field Diffie-Hellman in TLS – Public-Key Cryptography

2022-10-11 Angela Mandeville 0

7.10.3 Finite Field Diffie-Hellman in TLS When finite field groups are used, server Alice and client Bob execute the conventional Diffie-Hellman key agreement protocol as […]

Hybrid encryption – Public-Key Cryptography

2022-08-02 Angela Mandeville 0

7.11.2 Hybrid encryption A hybrid encryption scheme is a specific type of hybrid cryptosystem that allows Alice and Bob to securely encrypt data they want […]

Example – Hybrid Public Key Encryption – Public-Key Cryptography

2022-05-20 Angela Mandeville 0

7.11.3 Example – Hybrid Public Key Encryption Hybrid Public Key Encryption (HPKE) is a hybrid encryption scheme defined in RFC 9180 [15]. It provides public-key […]

Posts pagination

« 1 2 3 »

Archives

  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • August 2023
  • July 2023
  • May 2023
  • March 2023
  • January 2023
  • December 2022
  • October 2022
  • August 2022
  • May 2022
  • March 2022
  • February 2022
  • November 2021
  • September 2021
  • July 2021
  • June 2021
  • April 2021
  • February 2021
  • January 2021
July 2025
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
28293031  
« Aug    

Categories

  • Authenticity of public keys
  • Certification Exams of IT
  • Elliptic curves over finite fields
  • IT Certification Exams
  • Key pair generation
  • Projective coordinates
  • Security of the RSA algorithm

Copyright © 2025 | WordPress Theme by atkinswill