4.2.2 key Asymmetric cryptography (or Public key cryptography)A theory of the secret key is stored. One of the common people know announcement Not a secret key, called the public key and the public key that matches the stored private key itself, called the work, is that if we wish to send information back to someone else's public key encrypted with the man when he was sent to a recipient, the encrypted data decryption private key, which is used by the รหสได้ั khu.Of the public key that was encrypted, so it is a trap, but if you don't have a private key that is a pair of decryption, it wasn't by that encoding uses a mathematical principle called one-way functions (one-way function) are single-function ' Gloucester PLE part is associated with a specific number (pri.Me number) is that if removed. Prime number two came together, it would have multiplied the number of factors that are only options 2. Suppose a is a 249 11927 20903, 310, 81, which multiply with this simpler 20903 11927 find of 249, 310, 81 more specific numbers is much more harder to factor only. Assume that 249310081 is all that we are and if we know. One of the prime number as private key We will look for another is not difficult.Examples such as RSA cryptosystem RSA Cryptosystem, published by.Ron Rivest, Adi Shamir, and Leonard Adleman in 1978 by current reality encoded with this key 2 system will calculate two key parties, custom user 2 is applied to the system that it is a Public Key Infrastructure (PKI): Figure 4.9 using the function called Modular Arithmetic (Mod)
การแปล กรุณารอสักครู่..
