Public Key Encryption: By, Arya Santhosh Reshma Elsa Reji

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

PUBLIC KEY ENCRYPTION

By,
Arya Santhosh
Reshma Elsa Reji
PUBLIC KEY
A public key is created in public key
encryption cryptography that uses
asymmetric-key encryption algorithms.
Public keys are used to convert a message
into an unreadable format. Decryption is
carried out using a different, but
matching, private key. Public and private
keys are paired to enable secure
communication.
 Public-keysystems, such as Pretty Good
Privacy (PGP), are popular for
transmitting information via the Internet.
 They are extremely secure and relatively
simple to use. The only difficulty with
public-key systems is that you need to
know the recipient's public key to encrypt
a message for him or her.
Two main branches of public key
cryptography are:

1. Public key encryption


2. Digital signatures
Public-key encryption is
a cryptographic system that uses
two keys a public key known to
everyone and a private or secret
key known only to the recipient
of the message.
DIGITAL SIGNATURE
 An authentication mechanism that enables the
creator of a message to attach a code that acts as a
signature.
 In situations where there is not complete trust
between sender and receiver, something more than
authentication is needed.
 1. It must verify the author and the date and time of
the signature.
 2. It must to authenticate the contents at the time of
the signature.
 3. It must be verifiable by third parties, to resolve
disputes.
 Thus, the digital signature function includes the
authentication function.
Avariety of approaches has been
proposed for the digital signature
function. These approaches fall into
two categories: Direct and
Arbitrated
PUBLIC-KEY ENCRYPTION
 Public-keyencryption is
a cryptographic system that uses
two keys a public key known to
everyone and a private or secret
key known only to the recipient of
the message
 Direct Digital Signature :The direct digital
signature involves only the communicating parties
(source, destination). It is assumed that the
destination knows the public key of the source. A
digital signature may be formed by encrypting the
entire message with the sender's private key or by
encrypting a hash code of the message with the
sender's private key.
 Arbitrated Digital Signature : The problems
associated with direct digital signatures can be
addressed by using an arbiter. As with direct
signature schemes, there is a variety of arbitrated
signature schemes. In general terms, they all operate
as follows. Every signed message from a sender X to a
receiver Y goes first to an arbiter A, which check it’s
origin and context and then sent to Y.
APPLICATIONS FOR PUBLIC-KEY
CRYPTOSYSTEMS

 Public key cryptosystem used in many systems


such as:
 1.Decision support system

 2. RSA Algorithm

 3. Elliptic Curve

 4. Diffie-Hellman key exchange

You might also like