Next: Digital ModulationOctober 5, 1998
Up: EncryptionSeptember 30, 1997
Previous: Public Key Generation
- Encryption systems used in practice employ keys d and e of 56, 128, or
even 180 bits.
- To ``crack'' such encryption systems requires weeks or months of time on
the fastest supercomputers.
- Public key cryptography becomes more and more important with the advent of
electronic commerce.
- Public key cryptography can also be used for authentication purposes,
i.e., for verifying the identity of a sender.
- This is often called digital signatures.
- In an authentication system, both parties, say A and B, have public and
private keys eA,dA and eB,dB, respectively.
- To authenticate his signature S, B would first encrypt S with his private
key dB and then encrypt it again with A's public key eA.
- A can decrypt this doubly encrypted signature by first using his private
key dA and then B's public key eB.
- Furthermore, only A can decrypt the signature.
- And, B cannot refute later that this is his signature as only he knows the
private key dB.
Prof. Bernd-Peter Paris
1998-12-14