Table of Contents 1. Introduction & Motivation 2. Why We Need PKC 3. Public Key Encryption 4. RSA Cryptosystem 5. RSA Security Analysis 6. CPA/CCA Security 7. Digital Signatures 8. Complete Comparison 1. Introduction: The Security Landscape 🎯 Course Context This lecture focuses on securing communication at different layers of the IP/TCP stack. We can […]
Cryptography in Real-World Applications
TLS (Transport Layer Security) – Real-World Application What is TLS? Transport Layer Security (TLS) is a cryptographic protocol that provides secure communication over computer networks. It’s the successor to SSL (Secure Sockets Layer) and is widely used to secure web traffic (HTTPS), email, VPNs, and other network communications. Core Security Objectives: Confidentiality: Data encrypted so […]
Public Key Cryptography Foundations
Complete Guide to RSA, Rabin, Goldwasser-Micali, and ElGamal Cryptosystems Part I: RSA Encryption – Plain and OAEP RSA Algorithm Overview RSA remains one of the most widely used public-key cryptosystems. Understanding both its basic form and secure implementations is crucial for modern cryptography. Key Generation Process Choose two large primes: p and q (typically 1024+ […]