0% found this document useful (0 votes)
223 views46 pages

18CS744 Cryptography - Module 2 Notes

This document provides an overview of Module 2 which covers public-key cryptography and the RSA algorithm. It discusses the principles, applications, and requirements of public-key cryptosystems as well as analyzing public-key cryptanalysis. The RSA algorithm is described along with its computational aspects and security. Other public-key cryptosystems covered include Diffie-Hellman key exchange and Elgamal cryptographic systems. References for further reading on these topics from a textbook by William Stallings are also provided.

Uploaded by

akashroshan17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
223 views46 pages

18CS744 Cryptography - Module 2 Notes

This document provides an overview of Module 2 which covers public-key cryptography and the RSA algorithm. It discusses the principles, applications, and requirements of public-key cryptosystems as well as analyzing public-key cryptanalysis. The RSA algorithm is described along with its computational aspects and security. Other public-key cryptosystems covered include Diffie-Hellman key exchange and Elgamal cryptographic systems. References for further reading on these topics from a textbook by William Stallings are also provided.

Uploaded by

akashroshan17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 46

Cryptography (18CS744) Module 2: Public-Key Cryptography and RSA & Other

Public-Key Cryptosystems

MODULE-2

Public-Key Cryptography and RSA: Principles of public-key


cryptosystems. Public-key cryptosystems. Applications for public-key
cryptosystems, requirements for public-key cryptosystems. public-
key cryptanalysis. The RSA algorithm, description of the algorithm,
computational aspects, the security of RSA.
Other Public-Key Cryptosystems: Diffie-hellman key exchange, The
algorithm, key exchange protocols, man in the middle
attack, Elgamal Cryptographic systems

Textbook 1: William Stallings: Cryptography and Network Security,


Pearson 6th edition. Ch. 9, Ch. 10.1,10.2
RBT: L1, L2

Department of CSE, Vemana IT Page 1 of 1

You might also like