Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

[NETWORK MANAGEMENT

AND SECURITY]
Encryption of Messages For Intruder

N AME Y ASIR LATIF


R EG. NO 17-ARID-5736
C LASS BSIT 6 TH SEMESTER

S UBMITTED TO: SIR USMAN NASIR

Assignment #01
Shehzad (Protocol-Designer) has been told to design a scheme to prevent messages from
being modified by an intruder. Shehzad decides to encrypt the message with Asymmetric
BARANI INSTITUTE OF SCIENCES SAHIWAL
(Public Key Cryptosystem). Why doesn’t this solve the problem?
ANS: Shehzad decides to encrypt the message with Asymmetric (Public Key Cryptosystem) in
Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair
of related keys. one public key and one private key to encrypt and decrypt a message and protect
it from unauthorized access or use. A public key is a cryptographic key that can be used by any
person to encrypt a message so that it can only be deciphered by the intended recipient with their
private key. A private key is also known as a secret key and it is shared only with key initiator.

When someone wants to send an encrypted message, they can pull the intended recipient public
key from a public directory and use it to encrypt the message before sending it. The recipient of
the message can then decrypt the message using their related private key. No other choice would
be unlocked it. If the user wants to with another then it sending an error.

Reason for problem not solving:


(1) The main reason of problem not solving is if an individual loses his private key, he
cannot decrypt the messages he receives.
(2) Since the public keys are not authenticated, no one really knows if a public key belongs
to the person specified. Consequently, users must verify that their public keys belong to
them.
(3) If a hacker identifies a person private key, the attacker can read all of that individual's
messages from the sender and the sender does not know.

You might also like