Abstract
The key exchange problem occurs with symmetric cipher systems because the same key is used for both enciphering and deciphering messages. This means that both the sender and receiver must have the same key and it must be distributed to them via a secure method. While this is merely inconvenient if there are only two correspondents, if there are tens or hundreds of people exchanging secret messages, then distributing keys is a major issue. Public-key cryptography eliminates this problem by mathematically breaking the key into two parts, a public key and a private key. The public key is published and available to anyone who wants to send a message and the private key is the only key that can successfully decipher a message enciphered with a particular public key. This chapter investigates the mechanisms used to implement public-key cryptography.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bauer, Craig P. 2013. Secret history: The story of cryptology. Boca Raton, FL: CRC Press.
Diffie, Whitfield, and Martin. Hellman. 1976. New directions in cryptography. IEEE Transactions on Information Theory IT 22(6): 644–654.
Rivest, R.L., A. Shamir, and L. Adleman. 1978. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21(2): 120–126.
Singh, Simon. 1999. The code book: The evolution of secrecy from Mary, Queen of Scots to quantum cryptography. New York, NY: Doubleday.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2013 The Author(s)
About this chapter
Cite this chapter
Dooley, J.F. (2013). Alice and Bob and Whit and Martin: Public Key Crypto. In: A Brief History of Cryptology and Cryptographic Algorithms. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-01628-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-01628-3_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-01627-6
Online ISBN: 978-3-319-01628-3
eBook Packages: Computer ScienceComputer Science (R0)