use new diagrams for ch3

This commit is contained in:
Heiko Schaefer 2023-10-17 14:44:39 +02:00
parent 14e3919b9d
commit cf8c754624
No known key found for this signature in database
GPG key ID: 4A849A1904CCBD7D

View file

@ -23,10 +23,10 @@ Here are two important properties of cryptographic hash functions:
Participants in symmetric-key operations need to exchange the shared secret over a secure channel. Participants in symmetric-key operations need to exchange the shared secret over a secure channel.
```{admonition} VISUAL ```{figure} diag/symmetric_key.png
:class: warning ---
---
- visualization? (maybe a black key icon, following wikipedia's example?) A symmetric cryptographic key (which acts as a shared secret)
``` ```
### Benefits and downsides ### Benefits and downsides
@ -80,7 +80,7 @@ Unlike symmetric cryptography, participants are not required to pre-arrange a sh
Throughout this document, we will frequently reference asymmetric cryptographic key pairs: Throughout this document, we will frequently reference asymmetric cryptographic key pairs:
```{figure} diag/cryptographic_keypair.png ```{figure} diag/asymmetric_keypair.png
--- ---
--- ---
An asymmetric cryptographic key pair An asymmetric cryptographic key pair
@ -90,7 +90,7 @@ Each key pair comprises two parts: the public key and the private key. For ease
It's important to note that in many scenarios, only the public key is exposed or used (we will expand on these situations in subsequent sections): It's important to note that in many scenarios, only the public key is exposed or used (we will expand on these situations in subsequent sections):
```{figure} diag/keypair_pub.png ```{figure} diag/public_key.png
--- ---
--- ---
The public parts of an asymmetric key pair The public parts of an asymmetric key pair