Sie sind auf Seite 1von 11

PUBLIC KEY ENCRYPTION

By,
Arya Santhosh
Reshma Elsa Reji
PUBLIC KEY
A public key is created in public key
encryption cryptography that uses
asymmetric-key encryption algorithms.
Public keys are used to convert a message
into an unreadable format. Decryption is
carried out using a different, but
matching, private key. Public and private
keys are paired to enable secure
communication.
 Public-keysystems, such as Pretty Good
Privacy (PGP), are popular for
transmitting information via the Internet.
 They are extremely secure and relatively
simple to use. The only difficulty with
public-key systems is that you need to
know the recipient's public key to encrypt
a message for him or her.
Two main branches of public key
cryptography are:

1. Public key encryption


2. Digital signatures
Public-key encryption is
a cryptographic system that uses
two keys a public key known to
everyone and a private or secret
key known only to the recipient
of the message.
DIGITAL SIGNATURE
 An authentication mechanism that enables the
creator of a message to attach a code that acts as a
signature.
 In situations where there is not complete trust
between sender and receiver, something more than
authentication is needed.
 1. It must verify the author and the date and time of
the signature.
 2. It must to authenticate the contents at the time of
the signature.
 3. It must be verifiable by third parties, to resolve
disputes.
 Thus, the digital signature function includes the
authentication function.
Avariety of approaches has been
proposed for the digital signature
function. These approaches fall into
two categories: Direct and
Arbitrated
PUBLIC-KEY ENCRYPTION
 Public-keyencryption is
a cryptographic system that uses
two keys a public key known to
everyone and a private or secret
key known only to the recipient of
the message
 Direct Digital Signature :The direct digital
signature involves only the communicating parties
(source, destination). It is assumed that the
destination knows the public key of the source. A
digital signature may be formed by encrypting the
entire message with the sender's private key or by
encrypting a hash code of the message with the
sender's private key.
 Arbitrated Digital Signature : The problems
associated with direct digital signatures can be
addressed by using an arbiter. As with direct
signature schemes, there is a variety of arbitrated
signature schemes. In general terms, they all operate
as follows. Every signed message from a sender X to a
receiver Y goes first to an arbiter A, which check it’s
origin and context and then sent to Y.
APPLICATIONS FOR PUBLIC-KEY
CRYPTOSYSTEMS

 Public key cryptosystem used in many systems


such as:
 1.Decision support system

 2. RSA Algorithm

 3. Elliptic Curve

 4. Diffie-Hellman key exchange

Das könnte Ihnen auch gefallen