×Key Distribution : Negotiation ×Key Management : N*(N-1)/2
In 1978, Knapsack System, a public key cryptosystem, was raised by Merkle and Hellman based on its intractability
In 1978, RSA System, a public key cryptosystem, was raised by Rivest, Shamire and Adleman based on Decomposition of BigNumber and Detection of Primes
Why must we need authentication ?
Attack to Information Security : Passive Attack : Cut-Out & Analysis Active Attack : Forge, Resend, Distort, Reject Denial : deny the info sender sends
Defense : Passive Attack : Encryption Active Attack, Denial : Digital Signature
Reliability Unforgeability Nonduplication Unchangeability Nonrepudiation
Hash Encryption (RSA)Decryption (RSA) AU TH EN TIC ATI ON