Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 7 PKI and Cryptographic Applications (Asymmetric Cryptogaphy…
Chapter 7 PKI and Cryptographic Applications
Asymmetric Cryptogaphy
Public and Private Keys
RSA Public Key Algorithm based on large prime number
Merkle-Hellman Knapsack based on super-increasing sets
El Gamal - Freely available but doubles length of message it encrypts
Elliptic Curve (ECC) : y2 = x3 + ax + b
HASH : Value as message digest.
Requirements
Input can be of any length
Output has a fixed length
Hash function is relatively easy to comput for any input
Hash function is one-way
Hash functionis collusion free
Secure Hash Algorithm (SHA) government standard; Seure Hash Standard (SHS) also known as Federal Information Processing Standard (FIPS) 180.
SHA-1 produces 160-bit message digest. SHA processes 512-bit blocks
SHA-2
SHA-256; produces 256 bit message digest using 512 bit block size
SHA-224; produces 224-bit message digest using 512 bit block size
SHA-512; produces 512-bit message digest using 1024-bit block size
SHA-384; produces 384-bit message digest using 1024-bit block size
SHA-3. Remains in draft