Security Basics: Prof Mark Baker
Security Basics: Prof Mark Baker
Sources: Carnegie Mellon University, 2002 and Idaho National Laboratory, 2005
Plaintext Plaintext
Internet
Ciphertext
K10
Public key
Private key
• Security: To compute the private key from the public key is assumed
difficult.
9 March, 2006 [email protected]
Secure Message Exchange Using Asymmetric Keys
Send Jill's
Public public Key
Key
Jill Mark
Private
Key
Decrypt with
Use Jill's private key Jill's public Key
to encrypt
Examples: Examples:
DES, IDEA, RC5, AES, … RSA, ElGamal Encryption, ECC…
Serial number
Certificate issuer
Certificate holder
Validity period (note that the certificate is not valid before or after this period),
Digital signature from the certification authority to ensure that the certificate has not
been altered and to indicate the identity of the issuer,
Sender Public
Key
• Only the signer (who has a private key) can generate a valid
signature.
• Everyone (since the corresponding public key is published) can
verify if a signature with respect to a message is valid.