Public Key Cryptography



Download 0.67 Mb.
Page3/7
Date13.10.2023
Size0.67 Mb.
#62314
1   2   3   4   5   6   7
Lecture 2 Public Key Cryptography

Public Key Cryptography

  • The origin of public key encryption
  • In 1976, Whitfield Diffie, Martin Hellman and Ralph Merkle published a paper titled "New Directions in Cryptography." In this paper, they introduced the idea of public key cryptography and described the first known functional distributed cryptographic protocol. Since then, the public key encryption algorithm has been used in finance, e-business and e-commerce to keep data secure by using two mathematically related keys.

Public Key Cryptography

  • The most important properties of public key encryption scheme are −
  • Different keys are used for encryption and decryption. This is a property which set this scheme different than symmetric encryption scheme.
  • Each receiver possesses a unique decryption key, generally referred to as his private key.
  • Receiver needs to publish an encryption key, referred to as his public key.

Public Key Cryptography

  • Some assurance of the authenticity of a public key is needed in this scheme to avoid spoofing by adversary as the receiver. Generally, this type of cryptosystem involves trusted third party which certifies that a particular public key belongs to a specific person or entity only.
  • Encryption algorithm is complex enough to prohibit attacker from deducing the plaintext from the ciphertext and the encryption (public) key.
  • Though private and public keys are related mathematically, it is not be feasible to calculate the private key from the public key. In fact, intelligent part of any public-key cryptosystem is in designing a relationship between two keys.

Public Key Cryptography

  • The process for sending and receiving data via asymmetric cryptography typically consists of five steps:
  • Key generation. Each individual generates a public and private key.
  • Key exchange. The sender and recipient exchange public keys.
  • Encryption. The sender's data is encrypted using the recipient's public key.
  • Sending encrypted data. The encrypted data is sent to the recipient.
  • Decryption. The recipient decrypts the message using their own private key.

Download 0.67 Mb.

Share with your friends:
1   2   3   4   5   6   7




The database is protected by copyright ©ininet.org 2024
send message

    Main page