logo

Principle and Method in Cryptographic Security | Discussion

4 Pages638 Words19 Views
   

Added on  2022-09-12

Principle and Method in Cryptographic Security | Discussion

   Added on 2022-09-12

ShareRelated Documents
Running head: PRINCIPLE AND METHOD IN CRYPTOGRAPHIC SECURITY
PRINCIPLE AND METHOD IN CRYPTOGRAPHIC SECURITY
Name of the Student
Name of the University
Author Note
Principle and Method in Cryptographic Security | Discussion_1
1PRINCIPLE AND METHOD IN CRYPTOGRAPHIC SECURITY
Discussions
The public key cryptosystem is a system that utilizes a pair of keys that is the public
keys that may be extensively disseminated and the private keys that are known only to the
user of the keys (Aggarwal et al.,2018). A sender can merge a message with a private key in
order to create a digital signature that is short on the message.
The principle ingredients of the public key cryptosystem include a plaintext,
encryption algorithm, secret key, cipher text, the decryption algorithm, and original text that
is sent.
The plaintext is a term that is used in cryptography and it refers to a message after
decryption and before encryption (Luo, 2019). It can be said that it is a message in a form that
can be easily read by the humans.
A mathematical process in order to perform the encryption of data. Using this
algorithm, the information is made into a cipher that is meaningless and it needs the use of a
key in order to change the data into its original form (Barker & Mouha,2017).
A secret key is a bit of parameter or information that is utilized to decrypt or encrypt a
message in symmetric encryption. In asymmetric key encryption, two keys are used, the first
one is the public key and the other is the secret key (Gaži & Tessaro, 2015). The secret key is
also known as the private key.
In cryptography, a cipher text is the output of encryption that is executed on the
plaintext utilising and algorithm cal, the cipher (Ferguson, Schneier & Kohno, 2015). In
decryption that is the inverse of encryption, is the procedure of turning the cipher text into a
plaintext that can be read by the humans.
Principle and Method in Cryptographic Security | Discussion_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Desklib: Online Library for Study Material with Solved Assignments
|14
|3043
|423

Cryptography Assignment 2022
|8
|559
|16

Symmetric Encryption Assignment
|5
|884
|175

Cryptographic Techniques
|6
|2878
|62

Public Key Cryptography and RSA pdf
|44
|2675
|91

Security in Information Technology | Assignments
|13
|3545
|119