Tuesday, May 6, 2008

Assignment 16

Sections 6.6 and 6.7 wrapped up the chapter on RSA cryptosystems, which much to my dismay, didn't lead to any breakable ciphertexts for homework assignements, by illustrating how two countries could be sure that each was basically being honest with its information transfer to the other and then by describing, in general, the concept of a public-key cryptosystem. These two sections were more conceptual than mathematical but it was difficult to imagine examples of trapdoors for one-way functions that weren't already given by RSA. I also didn't understand why section 6.7 didn't come as section 6.1, but that's irrelevant.

The most significant part of this reading was probably the illustration of the development of the signature for an RSA cryptosystem which I had been wondering about since the introduction of a public-key cryptosystem in the first week of class. The security of it is still not completely understood as to how Eve could not replicate what country B does, but the illustration of the signature is a critical step in the public key cryptosystem.

No comments: