- Asymmetric Cryptography Overview
- This module reviews the principles and requirements of asymmetric cryptography, which uses a pair of keys - with one party using a public key and the other using the corresponding private key or vice versa - in contrast to symmetric cryptography using a shared secret key.
- RSA Algorithm
- This module describes the RSA cipher algorithm from the key setup and the encryption/decryption operations to the Prime Factorization problem and the RSA security.
- Diffie-Hellman Key Exchange
- Diffie-Hellman Key Exchange is an asymmetric cryptographic protocol for key exchange and its security is based on the computational hardness of solving a discrete logarithm problem. This module explains the discrete logarithm problem and describes the Diffie-Hellman Key Exchange protocol and its security issues, for example, against a man-in-the-middle attack.
- Key Distribution and Management
- Cryptographic schemes build on cryptographic key, which provides asymmetry between the legitimate parties and the attacker. This module describes key distribution approaches and focuses on the approach based on public-key certificates/authority and public-key infrastructure that can support large number of parties, e.g., Internet.