0 évaluation0% ont trouvé ce document utile (0 vote)
45 vues3 pages
Public-key cryptography was invented in 1976 by Whitfield Diffie and Martin Hellman. In this system, each person gets a pair of keys, called the public key and the private key. RSA encryption is widely used and is a 'de-facto' encryption standard.
Public-key cryptography was invented in 1976 by Whitfield Diffie and Martin Hellman. In this system, each person gets a pair of keys, called the public key and the private key. RSA encryption is widely used and is a 'de-facto' encryption standard.
Droits d'auteur :
Attribution Non-Commercial (BY-NC)
Formats disponibles
Téléchargez comme DOC, PDF, TXT ou lisez en ligne sur Scribd
Public-key cryptography was invented in 1976 by Whitfield Diffie and Martin Hellman. In this system, each person gets a pair of keys, called the public key and the private key. RSA encryption is widely used and is a 'de-facto' encryption standard.
Droits d'auteur :
Attribution Non-Commercial (BY-NC)
Formats disponibles
Téléchargez comme DOC, PDF, TXT ou lisez en ligne sur Scribd
What is Cryptography: cryptography is the practice and
hiding information. It is to be noted that encryption is no longer an exemptible option when conducting ecommerce. Given the importance it bears on ecommerce, it id one area that will have its share of security concerns as well. Encryption on its own cannot guarantee foolproof security so cryptography is to be needed.
Public-key cryptography:
• Public-key cryptography was invented in 1976 by
Whitfield Diffie and Martin Hellman.
• In this system, each person gets a pair of keys, called
the public key and the private key.
• Each person’s public key is published while the private
key is kept secret.
• Anyone can send a confidential message just using
public information, but it can only be decrypted with a private key that is in the sole possession of the intended recipient.
Cryptography can be classified as the study of
techniques and applications that depend on the existence of difficult problems. A cryptanalyst attempts to compromise cryptographic mechanisms and cryptology (from the Greek kryptos logos, meaning “hidden word”) is the discipline of cryptography and cryptanalysis combined.
The concept of public key cryptography is to solve the key
management problem. In their concept, each person gets a pair of keys one called public key and other is called private key. This eliminates the need for the sender and receiver to share secret information, as all communication involve only public keys, and no private key is ever transmitted or shared. This option also secured the communication against eavesdropping or betrayal.
The only requirement is that public keys must be associated
with their users in a trusted manner. With PKI, anyone can send a confidential message by using public key, which is in the possession of the intended recipient. Furthermore, public-key cryptography meets the need for privacy and authentication.
Important points:
• Using public key infrastructure (PKI), anyone can send a
confidential message using public information, which can be decrypted with a private key in the sole possession of the intended recipient.
• RSA encryption is widely used and is a ‘de-facto’
encryption standard.
• The MD5 algorithm is intended for digital signature
applications, where large file must be compressed securely before being encrypted.