Explain the main developments in E-Commerce Security
Coursework March 2004
Jonathan Lelliott - A052956
Part II - 1
The RSA Algorithm is a form of asymmetric public key cryptography that bases its security in the difficulty of factoring numbers. For Eve to properly decrypt the message that she intercepted, she would normally require the private key of the intended recipient. The sender issues a public key to each intended recipient of the message who then use import it into their 'key ring'. They use this key encrypt and decrypt messages from that particular sender.
Eve's ambition is to attack the RSA algorithm and find…
E-pasta adrese, uz kuru nosūtīt darba saiti:
Saite uz darbu: