Lecture 3
Lecture 3
Public-Key Cryptography
Two Techniques
it employs two different keys that take care of both the issues of symmetric key
encryption.
Two properties with a key pair.
● Most common hash size now is 256 bits and the common functions
are SHA-3, SHA-256 and Keccak.
● Hash value space, how good is 256 bits hash?
● A 256-bit hash value space is indeed very large. 2 to the power of 256
possible combinations of values.
● That is approximately 10 to the power of 77. That is 10 followed by 77
zeros.
Two Stucture of Hash
Step number 1,(GENERATE HASH) find the hash of the data fields of the
transaction.
Step number 2,(SIGNED UNSIGNED HASH) encrypt that hash using the
private key of the participant originating the transaction. Thus, digitally
signing the transaction to authorize and making the transaction non-
repudiable.
Step number 3, this hash just added to the transaction. It can be verified
by others decrypting it using the public key of the sender of the
transaction, and recomputing the hash of the transaction.