CS200: Computer Science, Spring 2003

Notes: Wednesday 23 April 2003
Schedule
 Now: Exam 2 Due
 28 April (9am): Problem Set 8 Due
 Before 1 May: SEAS Course Evaluations
 Before end of course: Course Improvement Survey (if you can't see the transparency, go directly to the survey).
For my office hours today (after class) and Thursday (45:30), I will be either in my office or in Small Hall.
Asymmetric Cryptography Use different keys for encryption and decryption. Reveal one of the keys (KU, the public key). Keep the other key secret (KR, the private key).
A message encrypted with the public key is decrypted with the private key. To send a confidential message to Alice, encrypt the message with her public key.
A message encrypted with the private key is decrypted with the public key. To sign a message, encrypt it with your private key. Some else can confirm that you wrote the message, but decrypting it using your public key. Only someone who knows the private key can create a message that can be decrypted with the corresponding public key.
Links Real mathematics has no effects on war. No one has yet discovered any warlike purpose to be served by the theory of numbers.
 R.L. Rivest, A. Shamir, L. Adleman. A Method for Obtaining Digital Signatures and PublicKey Cryptosystems , 1978. This is the original RSA paper, perhaps the most important paper in any field in the last 30 years. You should read it in the Rotunda or a lawn garden.
 Whitfield Diffie and Martin Hellman. New Directions in Cryptography, 1976.
 Junger decision allowing publication of RSA source code
 The Primes Pages
 http://crl.verisign.com/  VeriSign's Certificate Revokation List
 Free trial ID
 Microsoft, VeriSign, and Certificate Revocation , by Gregory L. Guerin (Schneier's original article)
 Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure, C. Ellison and B. Schneier. Computer Security Journal, v 16, n 1, 2000.
G. H. Hardy, The Mathematician's Apology, 1940.
We stand today on the brink of a revolution in cryptography. The development of cheap digital hardware has freed it from the design limitations of mechanical computing and brought the cost of high grade cryptographic devices down to where they can be used in such commercial applications as remote cash dispensers and computer terminals. In turn, such applications create a need for new types of cryptographic systems which minimize the necessity of secure key distribution channels and supply the equivalent of a written signature. At the same time, theoretical developments in information theory and computer science show promise of providing provably secure cryptosystems, changing this ancient art into a science.
Diffie and Hellman, November 1976.

cs200staff@cs.virginia.edu Using these Materials 