RSA Security Projection Television 5.2.2 Manual de usuario Pagina 100

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 376
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 99
Cryptography Overview
78 RSA BSAFE Crypto-C Developers Guide
Phase 1
The first party randomly generates a private value, a number k
1
, greater than 0 but
less than n. Similarly, the second party generates a random private value, k
2
.
Each party then computes a public value. To do this, they each compute R
i
= k
i
P. For
each party, this is an elliptic curve point. The two parties exchange their public values.
These private and public values correspond to the private and public key components
of a key pair. The public value is generated in such a way that computing the private
value from the public value is computationally infeasible.
Phase 2
Each participant computes the agreed-upon secret key, z, from the others public
value, R
j
, and their own private value, k
i
. The parties compute k
i
R
j
to get the elliptic
curve point S. This is a pair, (x
S
,y
S
). They then use the first coordinate of S, x
S
, as their
secret value.
Even with knowledge of the parameters and both public keys, an outside individual
will not be able to determine the secret key. One must have one of the private values
to determine the secret key. This means secret information is never sent over unsecure
lines.
Vista de pagina 99
1 2 ... 95 96 97 98 99 100 101 102 103 104 105 ... 375 376

Comentarios a estos manuales

Sin comentarios