非对称加密和密钥管理培训
Asymmetric Cryptography Overview
This module reviews the principles and requirements
of asymmetric cryptography, which uses a pair of keys - with one party using
a public key and the other using the corresponding private
key or vice versa - in contrast to symmetric cryptography using a shared secret key.
RSA Algorithm
This module describes the RSA cipher algorithm from the key setup and
the encryption/decryption operations to the Prime Factorization problem and the RSA security.
Diffie-Hellman Key Exchange
Diffie-Hellman Key Exchange is an asymmetric cryptographic protocol
for key exchange and its security is based on the computational hardness of solving a discrete logarithm problem.
This module explains the discrete logarithm problem and describes the Diffie-Hellman Key Exchange protocol
and its security issues, for example, against a man-in-the-middle attack.
Key Distribution and Management
Cryptographic schemes build on cryptographic key,
which provides asymmetry between the legitimate parties
and the attacker. This module describes key distribution approaches and focuses
on the approach based on public-key certificates/authority
and public-key infrastructure that can support large number of parties, e.g., Internet.