2 - Blockchain - Public-Key Cryptography
2 - Blockchain - Public-Key Cryptography
Public-key Cryptography
E: Encrypt function
=> Ghita can only understand the message if D: decrypt function
Ke: secret key
she knows the decrypt function and also the
Ciphertext: encrypted message
secret key
• Frequency analysis.
• Known plaintext attack
• Brute force (there are really only 25
possibilities for our key)
• How you will be sure that PSarah is actually the public key of
Sarah and not someone else.
=> certificate authorities, web of trust, SPKI, some blockchain-
based approaches
=> Obviously the one way function that are used are much
complex than just a square calculation (but the idea is the
same)
inspired from Web3 Foundation course
BLOCKCHAIN
Public-key Cryptography