logo

Public Key Cryptography and RSA pdf

44 Pages2675 Words91 Views
   

Added on  2022-01-21

Public Key Cryptography and RSA pdf

   Added on 2022-01-21

ShareRelated Documents
Chapter 9
Public Key Cryptography and RSA

© 2017 Pearson Education, Ltd., All rights reserved.
Public Key Cryptography and RSA pdf_1
Table 9.1
Terminology Related to Asymmetric Encryption

Source: Glossary of Key Information Security Terms, NIST IR 7298 [KISS06]

© 2017 Pearson Education, Ltd., All rights reserved.
Public Key Cryptography and RSA pdf_2
Misconceptions Concerning
Public-Key Encryption

Public-key encryption is more secure from
cryptanalysis than symmetric encryption

Public-key encryption is a general-purpose
technique that has made symmetric
encryption obsolete

© 2017 Pearson Education, Ltd., All rights reserved.
Public Key Cryptography and RSA pdf_3
The concept of public-key cryptography evolved from
an attempt to attack two of the most difficult
problems associated with symmetric encryption:

Whitfield Diffie and Martin Hellman from Stanford
University achieved a breakthrough in 1976 by coming
up with a method that addressed both problems and
was radically different from all previous approaches to
cryptography

Principles of Public-Key
Cryptosystems

How to have secure communications in general without having to
trust a KDC with your key

Key distribution

How to verify that a message comes intact from the claimed sender

Digital signatures

© 2017 Pearson Education, Ltd., All rights reserved.
Public Key Cryptography and RSA pdf_4
Public-Key Cryptosystems
A public-key encryption scheme has six ingredients:
Plaintext

The
readable
message
or data
that is fed
into the
algorithm
as input

Encryption
algorithm

Performs
various
transforma-
tions on the
plaintext

Public key

Used for
encryption
or
decryption

Private key

Used for
encryption
or
decryption

Ciphertext

The
scrambled
message
produced
as output

Decryption
algorithm

Accepts
the
ciphertex
t and the
matching
key and
produces
the
original
plaintext

© 2017 Pearson Education, Ltd., All rights reserved.
Public Key Cryptography and RSA pdf_5
Comparison of SK and PK
DISTINCT
FEATURES
SECRET KEY PUBLIC KEY
NUMBER OF
KEYS
Single key. Pair of keys.
TYPES OF KEYS Key is secret. One key is
private, and one
key is public.
SIZE OF KEY 50-250 bits 500-2500 bits
RELATIVE
SPEEDS
Faster. Slower.
Public Key Cryptography and RSA pdf_6
© 2017 Pearson Education, Ltd., All rights reserved.
Public Key Cryptography and RSA pdf_7
Table 9.2
Conventional and Public-Key Encryption

© 2017 Pearson Education, Ltd., All rights reserved.
Public Key Cryptography and RSA pdf_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Symmetric Encryption Assignment
|5
|884
|175

Principle and Method in Cryptographic Security | Discussion
|4
|638
|19

Security in Information Technology | Assignments
|13
|3545
|119

Cryptography and System Security .
|7
|1528
|232

Cryptography Assignment 2022
|8
|559
|16

Network Security: Cryptography, Data in Transit and Rest, Cloud Computing
|10
|1928
|459