Lecture Note
University
California State University, Los AngelesCourse
CS4780 | Cryptography and Information SecurityPages
3
Academic year
2023
Julie Elizabeth John
Views
0
29/9/19 Ristribution of Key Management Distribution of Public keys Public announcement KU A KU, - In this any Party If can send his /her broadcast the Key to the community at public key to any other participant or large last Drawback Anybody can forge such a public announce ment opion of redwiters froterial Public key fold mabist Publicly available Directory propries starth passed the girls add a novel with in profession kua KUb is issue int fine Publicly B for Available A Directory to at redgis work communication via Public keys. 1 user registers through 2 Parameters. 1) name - Eg: name - A 2) Public key. and Public key of A present is
- Greater degree of security Can b, maintaining Public derectory. achieved by a trusted 3rd Party Attacks on RSA 1. Brute force 2. mathematical attacks 3. Timerig attacks Avoidance 1. Constant exponentiation time 2. Random Pelay 3. Blinding 4. Fault Based Attack - The Power in the chip reduces. - The algorithm stored in Same machine and the power is reduced - not a serious attack in RSA. 5. Chosen ciples tent attack
- Encrypt using Rublic key PT using Public Key and finds -T in pam / the CT is dosen, he wants to find the Paivate key. / de has the onigmal CT in his hand and he compares with the CT obtained by enerystion with Public key.
Key Management-Distribution of Public keys
Please or to post comments