# A Brief History of Cryptology and Cryptographic AlgorithmsAlice and Bob and Whit and Martin: Public Key Crypto

A Brief History of Cryptology and Cryptographic Algorithms: Alice and Bob and Whit and Martin:... [The keyexchange problem occurs with symmetric cipher systems because the same key is used for both enciphering and deciphering messages. This means that both the sender and receiver must have the same key and it must be distributed to them via a secure method. While this is merely inconvenient if there are only two correspondents, if there are tens or hundreds of people exchanging secret messages, then distributing keys is a major issue. Public-key cryptography eliminates this problem by mathematically breaking the key into two parts, a publickey and a privatekey. The public key is published and available to anyone who wants to send a message and the private key is the only key that can successfully decipher a message enciphered with a particular public key. This chapter investigates the mechanisms used to implement public-key cryptography.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

# A Brief History of Cryptology and Cryptographic AlgorithmsAlice and Bob and Whit and Martin: Public Key Crypto

Part of the SpringerBriefs in Computer Science Book Series
9 pages

/lp/springer-journals/a-brief-history-of-cryptology-and-cryptographic-algorithms-alice-and-3rB4nCjv1X
Publisher
Springer International Publishing
© The Author(s) 2013
ISBN
978-3-319-01627-6
Pages
87 –96
DOI
10.1007/978-3-319-01628-3_9
Publisher site
See Chapter on Publisher Site

### Abstract

[The keyexchange problem occurs with symmetric cipher systems because the same key is used for both enciphering and deciphering messages. This means that both the sender and receiver must have the same key and it must be distributed to them via a secure method. While this is merely inconvenient if there are only two correspondents, if there are tens or hundreds of people exchanging secret messages, then distributing keys is a major issue. Public-key cryptography eliminates this problem by mathematically breaking the key into two parts, a publickey and a privatekey. The public key is published and available to anyone who wants to send a message and the private key is the only key that can successfully decipher a message enciphered with a particular public key. This chapter investigates the mechanisms used to implement public-key cryptography.]

Published: Sep 25, 2013

Keywords: Secret Message; Insecure Channel; Symmetric Cipher; Cipher System

### There are no references for this article.

Access the full text.

Sign up today, get DeepDyve free for 14 days.