Mathematical Foundations For Cryptography: Part III

In part II of this series, we looked at how two entities could share a secret in a public space using a key exchange. In this final part, we will look at authentication.

PART III: AUTHENTICATION AND RSA

Asymmetric Encryption

Faced with two cloaked figures who both are both claiming to be Beta, Alpha must find a way to determine which one is actually Beta. In order to do this, we are going to need to introduce some form of higher “authority”. Before going into what that means, let’s outline…