Striving for Secrecy

δΈ­ζ–‡

Encryptions Driving by Demands and Threats

How to keep it secret?
How to diliver secret key?
How to defend man-in-the-middle attack?
How to defend spoofing?
How to avoid denying?
Used to
How to authenticate public key?
Plain text
Symmetric cryptography
Asymmetric cryptography
One-way hash function
Message authentication code
Digital signature
Certification
Hybrid cryptosystem
Public Key Infrastructure