use new diagrams for ch3

This commit is contained in:
Heiko Schaefer 2023-10-17 14:44:39 +02:00
parent 0063ad480f
commit 96dbf77b16
No known key found for this signature in database
GPG key ID: 4A849A1904CCBD7D

View file

@ -23,10 +23,10 @@ Here are two important properties of cryptographic hash functions:
Participants in symmetric-key operations need to exchange the shared secret over a secure channel.
```{admonition} VISUAL
:class: warning
- visualization? (maybe a black key icon, following wikipedia's example?)
```{figure} diag/symmetric_key.png
---
---
A symmetric cryptographic key (which acts as a shared secret)
```
### Benefits and downsides
@ -80,7 +80,7 @@ Unlike symmetric cryptography, participants are not required to pre-arrange a sh
Throughout this document, we will frequently reference asymmetric cryptographic key pairs:
```{figure} diag/cryptographic_keypair.png
```{figure} diag/asymmetric_keypair.png
---
---
An asymmetric cryptographic key pair
@ -90,7 +90,7 @@ Each key pair comprises two parts: the public key and the private key. For ease
It's important to note that in many scenarios, only the public key is exposed or used (we will expand on these situations in subsequent sections):
```{figure} diag/keypair_pub.png
```{figure} diag/public_key.png
---
---
The public parts of an asymmetric key pair