RSA Security Projection Television 5.2.2 Instrukcja Użytkownika Strona 103

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 376
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 102
Chapter 3 Cryptography 81
Cryptography Overview
Figure 3-14 Secret Sharing Key Share Assignment
Figure 3-15 Secret Sharing Full Key Generation From Shares
Working with Keys
Key Generation
The techniques for generating public/private key pairs and symmetric keys are quite
different. Symmetric-key algorithms generally require an arbitrary random-byte
sequence, while a public/private key pair must satisfy a mathematical formula. Key
generation depends on the availability of a good random number generator, and the
security of a random number generator depends on the seed. See Pseudo-Random
Numbers and Seed Generation on page 92 for more information.
Share #1
A Secret
Value
Share # N
Secret
Splitting
N Shares
.
.
.
The
Original
Secret
Secret
Reconstruction
.
.
.
Any K
out of the
N shares
Przeglądanie stron 102
1 2 ... 98 99 100 101 102 103 104 105 106 107 108 ... 375 376

Komentarze do niniejszej Instrukcji

Brak uwag