RSA Security Projection Television 5.2.2 Bedienungsanleitung Seite 103

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 376
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 102
Chapter 3 Cryptography 81
Cryptography Overview
Figure 3-14 Secret Sharing Key Share Assignment
Figure 3-15 Secret Sharing Full Key Generation From Shares
Working with Keys
Key Generation
The techniques for generating public/private key pairs and symmetric keys are quite
different. Symmetric-key algorithms generally require an arbitrary random-byte
sequence, while a public/private key pair must satisfy a mathematical formula. Key
generation depends on the availability of a good random number generator, and the
security of a random number generator depends on the seed. See Pseudo-Random
Numbers and Seed Generation on page 92 for more information.
Share #1
A Secret
Value
Share # N
Secret
Splitting
N Shares
.
.
.
The
Original
Secret
Secret
Reconstruction
.
.
.
Any K
out of the
N shares
Seitenansicht 102
1 2 ... 98 99 100 101 102 103 104 105 106 107 108 ... 375 376

Kommentare zu diesen Handbüchern

Keine Kommentare