Professional Documents
Culture Documents
Crypto Assignment
Crypto Assignment
Crypto Assignment
Submitted
As a part of Assignment
For
Subject : Cryptography 18CS744
Submitted By
Sanjay Shetty 4SF19CS141
Shresht Subhash Chowta 4SF19CS153
Shreesha Rao P 4SF19CS152
Akarsh C Shetty 4SF19CS015
Srijan Kumar Shetty 4SF19CS164
A Jithesh Nikhil 4SF19CS001
Deekshith 4SF19CS053
Course Outcome
Discuss the classical encryption techniques and block ciphers and the data CL3
CO1
encryption standard
Describe the public key cryptography and RSA and the other Public Key CL3
CO2 Cryptosystems
Solve the Elliptic curve arithmetic, abelian groups, elliptic curves over real numbers, CL3
CO3
Illustrate the need of the key management and distribution
Module number : 5
Assessment Criteria
Si.No Assessment Criteria Marks Allotted
1 Assessment Criteria 1
2 Assessment Criteria 2
3 Assessment Criteria 3
4 Assessment Criteria 4
5 Assessment Criteria 5
Signature
Course Faculty
TABLE OF CONTENTS
1 Introduction 1
2 Technology 2
3 Case Study 3
4 Conclusion 5
5 References 6
1. Introduction:
The public key authority uses a pair of keys: the public key and the
private key to achieve security.
The public keys are prone to attacks and thus an intact infrastructure is
needed to maintain them.
1
2. Technology:
2
The digital document is generated and issued by a trusted third party
called a certification authority.
A public key certificate uses a pair of encryption keys, one public and one
private.
´The public key is made available to anyone who wants to verify the
identity of the certificate holder, while the private key is a unique key that
is kept secret.
Certificates allow key exchange without real-time access to public key
authority
All contents signed by a trusted public- key or certificate authority (CA)
Can be verified by anyone who knows the public key authority's public
key
3
3.Case Study:
X.509 CERTIFICATE:
4
4. Conclusion:
5
5. References: