Public key theory
Public key ciphers are generally based on mathematical problems known to be “hard”
discrete logarithm
factoring
The reverse operations are easy
discrete exponentiation
multiplication
Previous slide
Next slide
Back to first slide
View graphic version