Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 7

Cryptography

• Cryptography is the science of secret writing with the intention of


keeping the data secret. Cryptography is classified into symmetric
cryptography, asymmetric cryptography and hashing.
Rivest–Shamir–Adleman Algorithm
Public and Private Keys
• Public key - two keys are used one key is used for encryption and
another key is used for decryption. One key (public key) is used for
encrypt the plain text to convert it into cipher text and another key
(private key) is used by receiver to decrypt the cipher text to read the
message.
• Private key - the same key (secret key) is used for encryption and
decryption. In this key is symmetric because the only key is copy or
share by another party to decrypt the cipher text. It is faster than the
public key cryptography.
Public Key
• The most commonly used implementations of public key
cryptography (also known as public-key encryption and asymmetric
encryption) are based on algorithms presented by Rivest-Shamir-
Adelman (RSA) Data Security.
RSA
• RSA algorithm is asymmetric cryptography algorithm. Asymmetric
actually means that it works on two different keys i.e. Public Key and
Private Key. As the name describes that the Public Key is given to
everyone and Private key is kept private.
An example of asymmetric cryptography :
• A client (for example browser) sends its public key to the server and
requests for some data.
• The server encrypts the data using client’s public key and sends the
encrypted data.
• Client receives this data and decrypts it.

You might also like