Public Key Algorithms
This lecture covers the following topics:
- Public Key Encryption
- Public Key Encryption Example
- Modular Arithmetic
- Definitions
- Euclid's Algorithm
- Euclid's Algorithm: Tabular Method
- Chinese Remainder Theorem
- Euler's Totient Function
- Euler's Theorem
- Fermat's Theorem
- Miller and Rabin Method Prime Test
- RSA Public Key Encryption
- RSA Key Construction: Example
- RSA Issues
- Finding d and e
- Optimizing Private Key Operations
- Attacks on RSA
- Public-Key Cryptography Standards
- Million Message Attack on RSA
- Diffie-Hellman Key Agreement
- Man-in-Middle Attack on Diffie-Hellman
- ElGamal Signatures
- Digital Signature Standard
- DSS Insecurity
- Elliptic Curve Cryptography (ECC)
- Zero-Knowledge Proof Systems
- Summary
- References
Presentation slides in Adobe Acrobat Format:
1 slide/page
Slides + Audio: Part 1,
Part 2,
Part 3
(Using Flash and JavaScript)
Slides+Audio (
Part 1,
Part 2,
Part 3
)
Right click and save to download
Slides+Audio (
Part 1,
Part 2,
Part 3
) podcast.
Frequently asked questions about remote audio/video viewing
Back to other lectures of the series
Complete List of Audio/Video Lectures by Raj Jain
Back to Raj Jain's Home Page