1978
DOI: 10.21236/ada606588
|View full text |Cite
|
Sign up to set email alerts
|

A Method for Obtaining Digital Signatures and Public-Key Cryptosystems

Abstract: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: (1) Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intended recipient. Only he can decipher the message, since only he knows the corresponding decryption key. (2) A message can be "signed" using a privately held decrypti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
3,155
0
100

Year Published

1996
1996
2015
2015

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 2,757 publications
(3,281 citation statements)
references
References 0 publications
1
3,155
0
100
Order By: Relevance
“…In fact factorisation is not of purely academic interest only: it is the problem which underpins the security of many classical public key cryptosystems. For example, RSA [4], the most popular public key cryptosystem (named after the three inventors, Rivest, Shamir, and Adleman), gets its security from the difficulty of factoring large numbers. Hence for the purpose of cryptoanalysis the experimental realisation of quantum computation is a most interesting issue.…”
Section: Computation and Physicsmentioning
confidence: 99%
“…In fact factorisation is not of purely academic interest only: it is the problem which underpins the security of many classical public key cryptosystems. For example, RSA [4], the most popular public key cryptosystem (named after the three inventors, Rivest, Shamir, and Adleman), gets its security from the difficulty of factoring large numbers. Hence for the purpose of cryptoanalysis the experimental realisation of quantum computation is a most interesting issue.…”
Section: Computation and Physicsmentioning
confidence: 99%
“…In symmetric-key cryptography, only one key is used for both encryption and decryption technique [7][8][9]. This one key is known as private key.…”
Section: Rsa Cryptosystem and Image Encryption 31 Rsa Cryptosystemmentioning
confidence: 99%
“…Each chunk's data is encrypted in the client machine and sent via secure communication using RSA [27] and Advanced 81 | P a g e www.ijacsa.thesai.org Encryption Standard (AES) encryption [28]. The key differentiation between the method proposed in this work and traditional approaches is the use of a distributed key approach as opposed to the use of Public Key Infrastructure (PKI).…”
Section: ) Encryptionmentioning
confidence: 99%