# Public Key Cryptography Essay

950 words - 4 pages

Information Security overview for Managers and policy Makers
ITM517 Module 5 Case Study
Public-key cryptography
March 6th, 2013

Introduction
Cryptography is the study of protecting information through the use of codes and ciphers. Cryptography forms a fundamental part of message security. At its simplest form, is a process of methodically changing information to make it unreadable without knowing how that information was changed. One of the earliest and simplest codes (called a Caesar cipher) worked by taking the alphabet and shifting all the letters by a fixed number. The sender and recipient would both know how many letters to shift and thus could use this code to change ...view middle of the document...

This relationship ties the keys in the pair exclusively to one another: a public key and its corresponding private key are paired together and are related to no other keys.
This pairing is possible because of a special mathematical relationship between the algorithms for the public keys and private keys. The key pairs are mathematically related to one another such that using the key pair together achieves the same result as using a symmetrical key twice. The keys must be used together; each individual key cannot be used to undo its own operation. This means that the operation of each individual key is a one-way operation; a key cannot be used to reverse its operation. In addition, the algorithms used by both keys are designed so that a key cannot be used to determine the opposite key in the pair. Thus, the private key cannot be determined from the public key. The mathematics that makes key pairs possible, however, contributes to one disadvantage of key pairs as opposed to symmetric keys. The algorithms used must be strong enough to make it impossible for people to use the known public key to decrypt information that has been encrypted with it through brute force. A public key uses mathematical complexity and its one-way nature to compensate for the fact that it is publicly known to help prevent people from successfully breaking information encoded with it.
Applying this concept to the preceding example, the sender would use the public key to encrypt the plaintext into ciphertext. The recipient would then use the private key to decrypt the ciphertext back into plaintext.
Because of the special relationship between the private key and public key in the key pair, it is possible for one person to use the same key pair with many people rather than having to use a different key with each individual person. As long as the...

## Other Essays Like Public-Key Cryptography

### Cryptography Essay

2021 words - 9 pages cryptology in its most basic form. Webster's dictionary defines Cryptography as : n. 1. The act or art of writing in code or secret characters; also, secret characters, codes or ciphers, or messages written in a secret code. 2. The science which studies methods for encoding messages so that they can be read only by a person who knows the secret information required for decoding, called the key; it includes cryptanalysis, the science of decoding

### Mod 7 Essay Questions

1476 words - 6 pages are unknown and unpredictable by adversaries. The importance of random key generation is it will ensure the key could not be guess or just figured out. 4. Answer. There are two basic types of cryptographic keys: secret key, and public key. The combined use of secret and public key cryptography efficiently underwrites all the authentication, integrity, and secrecy services necessary for most users. The difference between the two is that in

### Security Protocols

1624 words - 7 pages  model, and it provides mutual authentication—both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks. Kerberos builds on symmetric key cryptography and requires a trusted third party, and optionally may use public-key cryptography by utilizing asymmetric key cryptography during certain phases of authentication. Kerberos uses port 88 by default. MIT developed

### Public Key Infrastructure

829 words - 4 pages Public Key Infrastructure Name Professor Course Date Public Key Infrastructure (PKI) refers to the procedures, policies and mechanisms that collectively provide a framework for addressing security fundamentals that include; confidentiality, integrity, access control, non-repudiation and authentication. The PKI infrastructure is used to validate the requestor’s identity and provide the assurance required in order to trust the security

### Motion Vector

2583 words - 11 pages protects information by transforming it into an unreadable format. It is useful to achieve 1from Greek, it literally means”covered writing” confidential transmission over a public network. The original text, or plaintext, is converted into a coded equivalent called cipher text via an encryption algorithm. Only those who possess a secret key can decipher (decrypt) the cipher text into plaintext. Steganography in video can be divided into

### Telecommunications Reform

3164 words - 13 pages RSA Data Security, Inc. RSA Data Security sells encryption products which are based on the Rivest-Shamir-Adelman public key encryption algorithms which were developed at MIT in the 1970's. Public key encryption is far superior to single key systems, as it does not require both parties to own identical sets of keys. RSA Data Security would like to be able to peddle its 128 bit key security products to the rest of the world. However, currently, it

### Modern Cryptography Research Paper

1553 words - 7 pages real-life signature. Because it is diﬃcult to convert a digital signature for message m which can be used as a sign a new message m’ A digital signature for a document would be bits which are derived from: the document and the secret key of the signer.The public key is available freely to anyone who wants to verify the signature. Whereas the other key, which is a secret key, is only known to the one that is authorized to generate the signatures

### Government Intervention On The Internet

2980 words - 12 pages . That's why I wrote it.(Zimmerman)Signatures.The most important benefits of encryption have been conveniently overlooked by the government. If everyone used encryption, there would be absolutely no way that an innocent bystander could happen upon material they find offensive. Only the intended receiver of the data could decrypt it (using public key cryptography, not even the sender can decrypt it) and view its contents. Each coded message also has an

### Electronic Commerce

1578 words - 7 pages Kerberos server, which sits between your computer system and the one you are communicating with. These latter two systems share a secret key with the Kerberos server to protect information from prying eyes and to assure that your data has not been altered during the transmission. But this technology has a potentially weak link: Breach the server, and the watchdog rolls over and plays dead. An alternative to private-key cryptography is a

### Strategic It Plan

4145 words - 17 pages benefit comes from protecting the traffic and connections on the network. For a small business like HHI, firewalls will be beneficial on software. PKI is the security construct that verifies and authenticates the legitimacy of the party involved via an internet transaction. PKI uses public key cryptography, using a pair of related cryptographic keys to verify the identity of the sender (signing) and/or to ensure privacy (encryption). Although

### Web Technology

2047 words - 9 pages cryptography and public key - Connection is reliable. XML XML, Extensible Markup Language, is a simplified subset of SGML, but strict language that supports SGML validation, structure and expansion. XML is a standardized text format specifically designed for the transfer of structured data to Web applications. XML specification describes an XML document, a class of objects with data stored in computers as well as partial behavior XML

## Related Papers

### Cryptography Essay

572 words - 3 pages blocks of bits. The decryption process for these two classification of symmetric encryption, of course, would be to use the same encryption key. Differences and Similarities with Symmetric and Asymmetric The fundamental difference between symmetric and asymmetric cryptography would be that asymmetric uses two keys, a public and private key, for encryption and decryption. If a private key is used to encrypt, then a related public key would be used

### Quantum Cryptography Essay

5279 words - 22 pages .................................................................................................. 4 The Key Distribution Problem ................................................................................. 4 The Quantum Solution ............................................................................................. 4 Quantum vs. Public-Key Cryptography.................................................................. 6 4 Quantum Computing

### Cryptography & Online Bankcard Transactions Essay

1796 words - 8 pages ………………………………………………………………….6 VI. Cryptography .…………………………………………………………..6 VII. Secret Key Cryptography .………………………………………………7 VIII. Public Key Cryptography.………………………………………………7 IX. Hash Functions ……..…………………………………………………...7 X. Biometrics …………………………...…………………………………...8 XI. Summary ………………………………………………………………8 XII. References ……………………………………………………………….9 I. Online Banking Overview The number of malicious applications targeting online

### Crypography Essay

605 words - 3 pages public key and private key holder can be interchanged. Symmetric Cryptography is suggested for the ease of implementation as symmetric-key cryptography makes encryption which both the sender and receiver share the same key. Besides, a message authentication code (MAC) can be implied to provide integrity and authenticity assurances on the message. Integrity assurances detect accidental and intentional message changes, while authenticity