Cryptography and Network Security: Seventh Edition, Global Edition by William Stallings
Cryptography and Network Security: Seventh Edition, Global Edition by William Stallings
Network Security
Seventh Edition, Global Edition
by William Stallings
Digital signatures
• How to verify that a message comes intact from the claimed sender
Encryption Decryption
Plaintext Public key Private key Ciphertext
algorithm algorithm
Accepts
The the
readable ciphertex
Performs The
message Used for Used for t and the
various scrambled
or data encryption encryption matching
transforma- message
that is fed or or produced key and
tions on the
into the decryption decryption as output produces
plaintext
algorithm the
as input original
plaintext
• The sender knows the value of e, and only the receiver knows the
value of d
• Public-key cryptanalysis