Sie sind auf Seite 1von 8

Sanidhy Nipsaiya

Roll No->39
BCA SEM-VI

Henric Johnson 1
 A private key is a tiny bit of code that is paired
with a public key to set off algorithms for text
encryption and decryption. It is created as part
of public key cryptography during
asymmetric-key encryption and used to
decrypt and transform a message to a readable
format. Public and private keys are paired for
secure communication, such as email.
 A private key is also known as a secret key.

Henric Johnson 2
 A private key is shared only with the key's
initiator, ensuring security. For example, A and
B represent a message sender and message
recipient, respectively. Each has its own pair of
public and private keys. A, the message
initiator or sender, sends a message to B. A's
message is encrypted with B’s public key,
while B uses its private key to decrypt A’s
received message.

A digital signature, or digital certificate, is used


to ensure that A is the original message sender.
To verify this, B uses the following steps:
Henric Johnson 3
 B uses A's public key to decrypt the digital
signature, as A must previously use its
private key to encrypt the digital signature
or certificate.
 If readable, the digital signature is
authenticated with a certification authority
(CA).
 In short, sending encrypted messages
requires that the sender use the recipient's
public key and its own private key for
encryption of the digital certificate. Thus,
the recipient uses its own private key for
message decryption, whereas the sender's
public key is used for digital certificate
decryption.
Henric Johnson 4
Henric Johnson 5
 The most obvious application of a public key
encryption system is in encrypting
communication to provide confidentiality – a
message that a sender encrypts using the
recipient's public key can be decrypted only by
the recipient's paired private key.
 Another application in public key
cryptography is the digital signature. Digital
signature schemes can be used for
sender authentication.
 Further applications built on this foundation
include: digital cash, password-authenticated
key agreement, time-stamping services, non-
repudiation protocols, etc.
Henric Johnson 6
 One approach to prevent such attacks involves the use
of a public key infrastructure (PKI); a set of roles,
policies, and procedures needed to create, manage,
distribute, use, store & revoke digital certificates and
manage public-key encryption. However, this in turn
has potential weaknesses.
 For example, the certificate authority issuing the
certificate must be trusted to have properly checked
the identity of the key-holder, must ensure the
correctness of the public key when it issues a
certificate, must be secure from computer piracy, and
must have made arrangements with all participants to
check all their certificates before protected
communications can begin.
Henric Johnson 7
 Diffie–Hellman key exchange protocol
 DSS (Digital Signature Standard), which
incorporates the Digital Signature Algorithm
 ElGamal
 Various elliptic curve techniques
 Various password-authenticated key
agreement techniques
 Paillier cryptosystem
 RSA encryption algorithm (PKCS#1)
 Cramer–Shoup cryptosystem
 YAK authenticated key agreement protocol
Henric Johnson 8

Das könnte Ihnen auch gefallen