Asymmetric key cryptography:-
In asymmetric cryptography, there are two keys: a private key and a public key. The private key is kept by the receiver. The public key is announced to the public.
public key:-
The development of public-key cryptography is the greatest and perhaps the only true revolution in the entire history of cryptography. It is asymmetric, involving the use of two separate keys, in contrast to symmetric encryption, which uses only one key. Public key schemes are neither more nor less secure than private key (security depends on the key size for both). Public-key cryptography complements rather than replaces symmetric cryptography. Both also have issues with key distribution, requiring the use of some suitable protocol.
The concept of public-key cryptography evolved from an attempt to attack two of the most difficult problems associated with symmetric encryption:
1.) key distribution – how to have secure communications in general without having to trust a KDC with your key
2.) Digital signatures – how to verify a message comes intact from the claimed sender
Public-key/two-key/asymmetric cryptography involves the use of two keys:
- a public-key, which may be known by anybody, and can be used to encrypt messages, and verify signatures
- a private-key, known only to the recipient, used to decrypt messages, and sign (create) signatures.
- is asymmetric because those who encrypt messages or verify signatures cannot decrypt messages or create signatures
- It is computationally infeasible to find decryption key knowing only algorithm & encryption key
- It is computationally easy to en/decrypt messages when the relevant (en/decrypt) key is known
0 Comments