Classical Public-key Method
The public-key method of cryptography allows a sender to sign a message (often only the cryptographic hash of the message) with a sign key in such a way that any recipient can, using the corresponding public key, check the authenticity of the message. To allow this, the public key is made broadly available to all potential recipients. To make sure only the legal author of the message can validly sign the message, the public key is created from a random, private sign key, using a one-way function. This is a function that is designed such that computing the result given the input is very easy, but computing the input given the result is very difficult. A classic example is the multiplication of two very large primes: The multiplication is easy, but factoring the product without knowing the primes is normally considered infeasible.
- easy
- very difficult
Read more about this topic: Quantum Digital Signature
Famous quotes containing the words classical and/or method:
“The basic difference between classical music and jazz is that in the former the music is always greater than its performanceBeethovens Violin Concerto, for instance, is always greater than its performancewhereas the way jazz is performed is always more important than what is being performed.”
—André Previn (b. 1929)
“The most passionate, consistent, extreme and implacable enemy of the Enlightenment and ... all forms of rationalism ... was Johann Georg Hamann. His influence, direct and indirect, upon the romantic revolt against universalism and scientific method ... was considerable and perhaps crucial.”
—Isaiah Berlin (b. 1909)