非对称加密和密钥管理培训
Asymmetric Cryptography Overview
This module reviews the principles and requirements of asymmetric cryptography,
which uses a pair of keys - with one party using a public key and the other using
the corresponding private key or vice versa - in contrast to symmetric cryptography using a shared secret key.RSA Algorithm
This module describes the RSA cipher algorithm from the key setup and the encryption/decryption
operations to the Prime Factorization problem and the RSA security.
Diffie-Hellman Key ExchangeDiffie-Hellman Key Exchange
is an asymmetric cryptographic protocol for key exchange and its security is based on
the computational hardness of solving a discrete logarithm problem.
This module explains the discrete logarithm problem and describes the Diffie-Hellman Key Exchange protocol and its security issues,
for example, against a man-in-the-middle attack.Key Distribution and
ManagementCryptographic schemes build on cryptographic key,
which provides asymmetry between the legitimate parties and the attacker.
This module describes key distribution approaches and focuses on the approach based
on public-key certificates/authority and public-key infrastructure that can support large number of parties, e.g., Internet.