o Review: Public-key Technology Public-key Technology Based on asymmetric cryptographic algorithms Public-Private Key Pairs Services: confidentiality, integrity, authentication and non-repudiation Cryptanalyst Cryptanalyst Source a Destination B Source a Destination B Encryption Decryption Decryption Destinati Algorithm Algorithm Algerithm KUa 復大辱软件学院 LiJTLiJT Review: Public-key Technology • Public-key Technology – Based on asymmetric cryptographic algorithms – Public-Private Key Pairs – Services: confidentiality, integrity, authentication and non-repudiation