Cryptography From 30,000 Feet
Security of cryptosystems is based on protecting “keys” (which are very large random numbers).
- Assume that the enemy knows how your system works.
In conventional systems, both parties have the same key.
In “public key” systems, one key is used to encrypt; another is used to decrypt.