Preview

Public Key Encription

Powerful Essays
Open Document
Open Document
1636 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Public Key Encription
1) How does the public key cryptography work? Explain in detail?

1. Public-key, what it is

Public-key refers to a cryptographic mechanism. It has been named public-key to differentiate it from the traditional and more intuitive cryptographic mechanism known as: symmetric-key, shared secret, secret-key and also called private-key.

Symmetric-key cryptography is a mechanism by which the same key is used for both encrypting and decrypting; it is more intuitive because of its similarity with what you expect to use for locking and unlocking a door: the same key. This characteristic requires sophisticated mechanisms to securely distribute the secret-key to both parties2.

Public-key on the other hand, introduces another concept involving key pairs: one for encrypting, the other for decrypting. This concept, as you will see below, is very clever and attractive, and provides a great deal of advantages over symmetric-key:

• Simplified key distribution
Digital Signature
• Long-term encryption

However, it is important to note that symmetric-key still plays a major role in the implementation of a Public-key Infrastructure or PKI.

1.1 A definition

Public-key is commonly used to identify a cryptographic method that uses an asymmetric-key pair3: a public-key and a private-key 4. Public-key encryption uses that key pair for encryption and decryption. The public-key is made public and is distributed widely and freely. The private-key is never distributed and must be kept secret.

Given a key pair, data encrypted with the public-key can only be decrypted with its privatekey; conversely, data encrypted with the private-key can only be decrypted with its publickey. This characteristic is used to implement encryption and digital signature. Both encryption and digital signature principles are illustrated in Figure 1 and Figure 2.

1.2 Encryption and Decryption

Encryption is a mechanism by which a message is transformed so that only the sender and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    1. Public Keys and Public Certificates can be stored in the Central Repository. It is not the same as the Public Key Infrastructure, but it is not the same.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2) KeyGenSer(GP): Taking GP as an data or the input, this algorithm generates a private and public key combine (skS,pkS) for the data/information server.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Quality Medical Company is interested in expanding its ability to obtain more customers/clients through the Quality Medical Company’s internet presence. Quality Medical Company should consider the use PKI (Public Key Infrastructure) and Encryption to achieve a competitive and compliance advantage.…

    • 575 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Bs1 Revision Booklet

    • 1094 Words
    • 5 Pages

    PUBLIC GOODS- Goods that can be benefited by everyone. Things that can’t be in the private sector because it is impossible to stop people from using them even without paying (e.g lampposts, police)…

    • 1094 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Unit Btec Diploma It

    • 950 Words
    • 4 Pages

    Private Key: Public-key cryptography refers to a cryptographic system requiring two separate keys, one to lock or encrypt the plaintext, and one to unlock or decrypt the cyphertext. Neither key will do both functions. One of these keys is published or public and the other is kept private.…

    • 950 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    BTEC level 3 Unit 1

    • 1332 Words
    • 6 Pages

    Private sector is a business or organisation that is ran by individuals for a profit. Public sector is a business or organisation ran by the government for no profit, these organisations are part of voluntary sector. Voluntary Sector is the sphere of social activity that lets the community join in and bring them closer, it is also non-governmental and not for a profit.…

    • 1332 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    6. Where can you store your public keys or public certificate fi les in the public domain? Is this the same thing as a public key infrastructure (PKI) server?…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    chapter01

    • 7053 Words
    • 24 Pages

    These components work together to allow communication using public key cryptography and symmetric keys for digital signatures, data encryption, and integrity.…

    • 7053 Words
    • 24 Pages
    Good Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The encryption system translates the biometric data file into a code using a mathematical tool called a hash function. This is an algorithm that generates a small but unique set of numbers from a larger data file. Although encryption may be confusing for most people, it is a very effective way to protect someone’s biometric data. Encryption adds an additional measure of security to the system so that certain viruses and malware cannot penetrate it. It also makes one’s personal data twice as hard for cyber criminals to hack into. Without encryption, biometric data would be more likely to be accessed and compromised. Using encryption makes biometric data more difficult to penetrate, ensuring that the information therefore, is safe, protected and the user’s privacy is still intact.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    1. What is the difference between a public good and a private good? The difference between a public good, and a private good is that a public good is for everyone to use. The public good is provided for all to have use to such as a restroom, or water fountain. Now a private good will be when everyone is still able to use the good, but it can now come at some type of cost. An example here would be a library will charge some to make a fax or copy something. This is the differences between a public and private goods.…

    • 281 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    A public service is a service that is funded by the government or by donations to help the government deliver its actions as effectively as possible. There are two types of public services they are statutory and non-statutory services. The difference between a statutory and a non-statutory service is that a statutory service is paid by tax payers, funded by the government and is set up by the law. They are usually uniformed and highly professional an example would be the Emergency Services and the Armed Forces. A non-statutory service is a service that doesn’t receive a lot of government funding so they are paid by members or the public as they are registered as charities, they are set up by individuals and not parliament and unlike statutory services they have smaller employers and are run by volunteers an example is the RSPCA and St John’s Ambulance. Both public services are needed because statutory services help give the public a sense of national security and to keep order and non-statutory services are needed to ensure safety to victims of incidents and to help the statutory services concentrate on what they need to do to resolve the issue.…

    • 1418 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    This occurs when a parent network provides filtering for traffic before it enters the child network to which individual and business customers connect.…

    • 16853 Words
    • 68 Pages
    Powerful Essays
  • Good Essays

    1) The subfields of anthropology seem quite diverse in their specific subjects and methods. Why, then, are they all considered parts of the single discipline of anthropology? What ties them together? Anthropology is divided up into four sub-fields of study (Park, 2014). The four sub-fields are biological anthropology, cultural anthropology, linguistic anthropology, and archaeology (Park, 2014).…

    • 1302 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays