摘要 |
Several processes and techniques for creating cryptosystems are disclosed. Cryptosystems created accordingly use a personalized secret such as a user-chosen password as a private key and a trio consisting of a first public exponent, a second public exponent, and a modulus as a public key. The public key and the private key form a public/private key pair. Selection of the personalized secret is discretionary and uses no information about the public key.
|