- 1、本文档共9页,可阅读全部内容。
- 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
The Mathematics of the RSA PublicKey (RSA PublicKey的数学)
The Mathematics of the RSA Public-Key Cryptosystem
Burt Kaliski
RSA Laboratories
ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement
with the security industry has been through the company that Ronald Rivest, Adi Shamir
and Leonard Adleman started in 1982 to commercialize the RSA encryption algorithm
that they had invented. At the time, Kaliski had just started his undergraduate degree at
MIT. Professor Rivest was the advisor of his bachelor’s, master’s and doctoral theses, all
of which were about cryptography. When Kaliski finished his graduate work, Rivest
asked him to consider joining the company, then called RSA Data Security. In 1989, he
became employed as the company’s first full-time scientist. He is currently chief
scientist at RSA Laboratories and vice president of research for RSA Security.
Introduction
Number theory may be one of the “purest” branches of mathematics, but it has turned out
to be one of the most useful when it comes to computer security. For instance, number
theory helps to protect sensitive data such as credit card numbers when you shop online.
This is the result of some remarkable mathematics research from the 1970s that is now
being applied worldwide.
Sensitive data exchanged between a user and a Web site needs to be encrypted to prevent
it from being disclosed to or modified by unauthorized parties. The encryption must be
done in such a way that decryption is only possible with knowledge of a secret decryption
key. The decryption key should only be known by authorized parties.
In traditional cryptography, such as was available prior to the 1970s, the encryption and
decryption operations are performed with the same key. This means that the party
encrypting the data and the party decrypting it need to share the same decryption key.
Establishing a shared key between the parties is an interesti
您可能关注的文档
- The Influence of Modernism and (现代主义的影响).pdf
- The influence of hydrostatic pressure on the (静水压力的影响).pdf
- The influence of small voids on the fatigue (小空洞疲劳的影响).pdf
- The Influence of Personality Dimensions on (人格维度的影响).pdf
- THE INFLUENCE OF THE CHEMICAL (化学的影响).pdf
- THE INFLUENCE OF THE MULTIPASS DRAWING (多通道的影响图).pdf
- THE INFRARED SPECTRUM OF WATER (水的红外光谱).pdf
- THE INHIBITIVE EFFECT OF ETHANOLAMINE ON (乙醇胺的抑制的效果).pdf
- The Innovation Trend Chart a policy learning tool(创新趋势图表策略学习工具).pdf
- The Insect Circulatory System University of San (圣大学昆虫循环系统).pdf
最近下载
- 《《机械创新设计》课程标准.doc VIP
- 小学残疾儿童送教上门教案(40篇).pdf
- 菜品知识培训.pptx
- 旅游收入与分配-(精选·公开·课件).ppt
- 2023年长三角一体化示范区苏州湾投资发展(江苏)有限公司人员招聘考试参考题库及答案解析.docx
- 高压氧治疗对于颈椎病患者的影响分析.pptx
- 2021年长三角一体化示范区苏州湾投资发展(江苏)有限公司招聘试题及答案解析.docx
- 尼可地尔夜景游览欣赏岛上迷人的夜间灯光和美景.pptx
- 2023年长三角一体化示范区苏州湾投资发展(江苏)有限公司招聘考试试题及答案解析.docx
- 第六单元跨学科实践活动5基于碳中和理念设计低碳行动方案教学设计-2024-2025学年九年级化学人教版上册.docx
文档评论(0)