[Home]History of Cryptography

HomePage | Recent Changes | Preferences

Revision 47 . . December 18, 2001 9:56 pm by Hagedis [I think this is more accurate]
Revision 46 . . December 18, 2001 9:18 pm by Hagedis [a few minor changes]
Revision 45 . . (edit) December 18, 2001 4:43 pm by WojPob [reformat a bit]
Revision 44 . . December 9, 2001 8:19 pm by Taw [link to RIPEMD-160]
Revision 43 . . (edit) December 9, 2001 4:33 pm by The Anome [cryptology -> cryptography, my error fixed]
Revision 42 . . December 9, 2001 4:32 pm by The Anome [Mentioned the babington plot]
Revision 41 . . December 9, 2001 4:29 pm by The Anome [copyedit of crypto goals]
Revision 40 . . December 9, 2001 4:26 pm by The Anome [added see-also, Purple code]
Revision 39 . . (edit) December 8, 2001 4:50 am by Tao [Extremely minor rewording.]
Revision 38 . . December 8, 2001 2:44 am by DavidSaff [Edited first paragraph to remove computation-centric approach.]
Revision 37 . . December 8, 2001 2:37 am by The Anome [added SIGINT as topic, which could absorb a couple of the others..]
Revision 36 . . (edit) December 8, 2001 2:28 am by WojPob
Revision 35 . . (edit) December 8, 2001 2:28 am by WojPob
Revision 34 . . December 7, 2001 12:58 am by Tao [Added note about AES.]
Revision 33 . . (edit) December 5, 2001 11:02 am by Tao [Altered sentence so it actually made sense.]
Revision 32 . . December 4, 2001 11:40 pm by Tao [Expanded public key cryptography and other fixes]
Revision 31 . . (edit) December 4, 2001 9:44 pm by (logged).205.8.xxx [Rephrased.]
Revision 30 . . (edit) December 4, 2001 9:37 am by (logged).205.8.xxx [unauthorized -> unauthorised (to match with rest of document) and cleaned link]
Revision 29 . . (edit) December 4, 2001 9:33 am by (logged).205.8.xxx [Changed to clearer English.]
Revision 28 . . December 4, 2001 7:11 am by (logged).205.8.xxx [Added a few more paragraphs and altered formatting]
Revision 27 . . (edit) December 2, 2001 10:52 am by (logged).205.8.xxx [Made better definition of "message integrity".]
Revision 26 . . (edit) December 2, 2001 10:46 am by (logged).205.8.xxx [Added another book (the ISBN *is* correct, I checked it more than is healthy)]
Revision 25 . . December 2, 2001 10:28 am by (logged).205.8.xxx [Added cryptographic goals and a "talk" doohickey]
Revision 24 . . (edit) December 2, 2001 10:11 am by (logged).205.8.xxx [Fixed broken link (I'm a moron)]
Revision 23 . . (edit) December 2, 2001 9:58 am by (logged).205.8.xxx [Added more books to further reading]
Revision 22 . . November 13, 2001 5:55 am by Taw [added link to Cryptographers]
  

Difference (from prior major revision) (author diff)

Changed: 30c30
Prior to this, [encryption keys]? were symmetric, and possession of the key would allow both encryption and decryption of the message. The key had to be exchanged between the communicating parties via a secure channel such as a trusted courier or face-to-face contact. This situation rapidly becomes unmanageable when the number of participants increases. In particular, a seperate key is required for each communicating pair if other parties are not to decrypt their messages.
Prior to this, [encryption keys]? were symmetric, and possession of the key would allow both encryption and decryption of the message. The key had to be exchanged between the communicating parties via a secure channel such as a trusted courier or face-to-face contact. This situation rapidly becomes unmanageable when the number of participants increases. In particular, a seperate key is required for each communicating pair if other parties are not to decrypt their messages. A system of this kind is also known as a "private key cryptosystem".

Changed: 32c32
Public key cryptography allows the key to be split into an asymmetric key pair consisting of two separate keys. A message encrypted using one of the keys must be decrypted using the other. One of the keys can now be distributed as far as possible to allow anyone to encrypt messages for a particular key pair -- a public key. Only one key pair is now needed per receiver as possession of the public key does not compromise the security of the private key.
In public key cryptography, there are a pair of related keys, one of which is made public and used for encryption -- the public key. The private key is kept secret and used for decryption. A system of this kind is known as asymmetric. Only one key pair is now needed per receiver as possession of the public key does not compromise the security of the private key. In general the system is not reversable, i.e., a message encrypted with the private key can not be decrypted with the public key, although this is the case for RSA.

HomePage | Recent Changes | Preferences
Search: