Cryptography, Lecture 06
Cryptography, Lecture 06
➢ This systems works quite similarly to the good old mailbox on the corner of a
street: Everyone can put a letter in the box, i.e., encrypt, but only a person with a
private (secret) key can retrieve letters, i.e., decrypt.
Principles of Asymmetric
Cryptography (Cont.)
➢ If we assume we have cryptosystems with such a
functionality, a basic protocol for public-key
encryption looks as shown in the following Figure.