Public Key PrinciplesThis page outlines some crypto principles related to public key encryption. This includes computing the GCD (Greatest Common Divisor), Quadratic residues (mod p), and Exponentiation.
|
Outline
With public key encryption (PKE), Alice generates a key pair: a public key and a private key. If Bob wants to send her a secret message, he takes the message (\(M\)) and encrypts with her public key (\(pk\)), to create a cipher (\(C\)). Alice decrypts this with her private key (\(sk\)). But, how can we trust Alice's public key? Well, Trent - who Bob trusts - will verify her public key.
Presentation