Abstract
In this chapter, the notion of public key cryptography is introduced. Then the RSA-scheme introduced by Rivest, Shamir, and Adleman is treated. The security of this scheme is based on factorization problems of integers. We also include illustrations of how another number theoretical problem, known as the discrete logarithm problem, is used and implemented in the public key cryptographic systems today.
Cite
CITATION STYLE
APA
Smalø, S. O. (2011). Public key cryptography. In A Multidisciplinary Introduction to Information Security (pp. 37–48). CRC Press. https://doi.org/10.2307/j.ctvz938zn.7
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.
Already have an account? Sign in
Sign up for free