密码学原理技术-第六章-introduction to pulibc-key cryptography

文章目录

  • 总结
  • [Symmetric Cryptography revisited](#Symmetric Cryptography revisited)
    • [Symmetric Cryptography: Analogy](#Symmetric Cryptography: Analogy)
    • [Symmetric Cryptography: Shortcomings](#Symmetric Cryptography: Shortcomings)
  • [principles of asymmetric cryptography](#principles of asymmetric cryptography)
    • [Idea behind Asymmetric Cryptography](#Idea behind Asymmetric Cryptography)
    • [asymmetric(public key) cryptography](#asymmetric(public key) cryptography)
    • [aSymmetric Cryptography: Analogy](#aSymmetric Cryptography: Analogy)
  • [practical aspects of public-key cryptograpy](#practical aspects of public-key cryptograpy)
    • [basic protocol for public-key Encryption](#basic protocol for public-key Encryption)
    • [security Mechanisms of Public-Key Cryptography](#security Mechanisms of Public-Key Cryptography)
    • [basic key transport protocol](#basic key transport protocol)
  • [important public-key algorithm](#important public-key algorithm)
    • [how to build public-key algorithms](#how to build public-key algorithms)
    • [key lengths and security levels](#key lengths and security levels)
  • [essential number theory for public-key algorithm](#essential number theory for public-key algorithm)
    • [Euclidean algorithm](#Euclidean algorithm)
    • [extended Euclidean algorithm](#extended Euclidean algorithm)
      • [Euler's Phi Function(欧拉函数)](#Euler's Phi Function(欧拉函数))
      • [Fermat's Little Theorem](#Fermat's Little Theorem)
      • [欧拉定理(Euler's Theorem)](#欧拉定理(Euler's Theorem))

总结

Symmetric Cryptography revisited

Symmetric Cryptography: Analogy

Symmetric Cryptography: Shortcomings


principles of asymmetric cryptography

Idea behind Asymmetric Cryptography

asymmetric(public key) cryptography

aSymmetric Cryptography: Analogy

practical aspects of public-key cryptograpy

basic protocol for public-key Encryption

security Mechanisms of Public-Key Cryptography





basic key transport protocol

使用 AES 作为对称加密的混合加密协议

important public-key algorithm

how to build public-key algorithms

key lengths and security levels

essential number theory for public-key algorithm

Euclidean algorithm


原理证明

extended Euclidean algorithm

先列出标准欧几里得算法表格,然后一步一步回代(上一步余数的等式带入当前式子)

证明



12mod67和67mod12的最后得到的式子是一样的,所以不如直接用67mod12,因为12mod67会转换成67mod12,此时67是r0,12是r1

Euler's Phi Function(欧拉函数)


欧拉函数的高效计算方法


Fermat's Little Theorem

欧拉定理(Euler's Theorem)


相关推荐
搬砖魁首5 小时前
密码学系列 - SR25519与ED25519
密码学
胡耀超1 天前
对称加密算法(AES、ChaCha20和SM4)Python实现——密码学基础(Python出现No module named “Crypto” 解决方案)
开发语言·python·密码学·数据安全·aes·sm4·chacha
敲上瘾1 天前
从明文裸奔到密钥长城:HTTPS加密全链路攻防与CA信任锚点构建
服务器·网络·网络协议·http·网络安全·https·密码学
东东__net3 天前
密码学_加密
密码学
胡耀超3 天前
哈希函数详解(SHA-2系列、SHA-3系列、SM3国密)案例:构建简单的区块链——密码学基础
区块链·密码学·哈希算法·数据安全·sha·sm3
明月看潮生3 天前
青少年编程与数学 02-018 C++数据结构与算法 24课题、密码学算法
c++·算法·青少年编程·密码学·编程与数学
胡耀超4 天前
对比表格:数字签名方案、密钥交换协议、密码学协议、后量子密码学——密码学基础
密码学·数据安全·数字签名·秘钥交换·密码学协议·后量子密码学
倒霉男孩6 天前
区块链密码学核心
区块链·密码学
胡耀超6 天前
非对称加密算法(RSA、ECC、SM2)——密码学基础
密码学·rsa·sm2·ecc·分类分级
爱思德学术6 天前
IEEE会议:第十届网络安全与信息工程国际会议(ICCSIE 2025)
网络安全·密码学·信息与通信