【導讀】Communications,7thEdition,Consideredtobe“asymmetric”,sincetwokeysare. Public-keyEncryption(Fig.). encryptionkey.key.Public-keyAuthentication(Fig.). privatekey.key.message.DigitalSignatures. canbeused.content,andsequencing.forpublic-keyencryption.LenAdleman(MIT).Encryption. –PublicKeyisKU={e,n}.integers).Decryption. –PrivateKeyisKR={d,n}.–M=Cdmodn.integersM<n.eandn.pandq.–?(n)=(p-1)x(q-1).4.Selectintegere.–gcd(?(n),e)=1;1<e<?5.Calculated.–de=mod?(n)=1.6.PublicKeyisKU={e,n}.7.PrivateKeyisKR={d,n}.–1.Selectprimes,p=17andq=11.–2.Calculaten=pxq=17x11=187.–3.Calculate?(n)=(17-1)x(11-1)=160.–4.Selecte.(n)=32x5=25x5.Possiblee’s:3,7,11,...,<?(n)=160. Choose7.–5.Determined.Solve(dx7)mod160=1,whered<160.Thismeans(dx7)=(kx160)+1forkan. integer.d=23,since23x7=161=10x160+1.–6.ThePublicKeyisKU={7,187}.EncryptionExample. –LetM=88.–C=887mod187.Xa+bmodn={(Xamodn)(Xbmodn)}modn.C={(884mod187)(882mod187)(881mod187)}mod187. C={132x77x88}mod187. C=