ABSTRACT

When examining Figure 1.1, it is interesting to note that until

1973, when James Ellis, Clifford Cocks, and Malcolm Williamson

first developed the concept of public-key encryption [121], and

1976, when Whitfield Diffie and Martin Hellman proposed their

revolutionary key distribution methodology [70], all cryptosystems

were symmetric-key based. Based on Figure 1.1, it is clear that

cryptographic algorithms used to ensure confidentiality fall within

one of two categories: symmetric-key (also known as secret-key

and private-key) and public-key. Symmetric-key algorithms use

the same key for both encryption and decryption. Conversely,

public-key algorithms use a public key for encryption and the

verification of Digital Signatures while using a private key for

tosystems tend to be hybrid systems that include both symmetric-

key and public-key algorithms. In a typical session, a public-

key algorithm will be used for the exchange of a session key and

to provide authenticity through Digital Signatures . The session

key is then used in conjunction with a symmetric-key algorithm.