Table of Contents 1. Introduction & Motivation 2. Why We Need PKC 3. Public Key Encryption 4. RSA Cryptosystem 5. RSA Security Analysis 6. CPA/CCA Security 7. Digital Signatures 8. Complete Comparison 1. Introduction: The Security Landscape 🎯 Course Context This lecture focuses on securing communication at different layers of the IP/TCP stack. We can […]
Encryption and Certificates
Some quick notes on doing encryption. Encryption is a process, by which information can be transformed (encoded) in such a format, that only authorized parties can read (decode) the information, and unauthorized parties cannot. The purpose of encrypting information is to protect the sensitive data from unauthorized use. Symmetric and Asymmetric Encryption In a symmetric […]