Advantages and disadvantages of public key cryptography, Computer Engineering

Assignment Help:

What are the advantages and disadvantages of public key cryptography?

Advantages and Disadvantages:

Improved security and convenience: private keys never require be transmitting or revealing to anyone.
They can give a method for digital signatures

Public-key authentication protects repudiation; all users have sole responsibility for protecting his or her private key. Such property of public-key authentication is frequently termed as non-repudiation.

A drawback of using public-key cryptography for encryption is speed. The best solution for encryption is to merge public and secret-key systems.

The public-key system can be utilized to encrypt a secret key that is used to encrypt the bulk of message or a file. Such a protocol is termed as a digital envelope. A successful attack upon a certification authority will permit an adversary to impersonate whomever the adversary decides to by using a public-key certificate through the compromised authority to bind a key of the adversary's pick to the name of other user. Public-key cryptography is not implies as replace secret-key cryptography, although rather to supplement this, to make this more secure.


Related Discussions:- Advantages and disadvantages of public key cryptography

.rapid technology, Choose one area of rapid technological change in IT or C...

Choose one area of rapid technological change in IT or Computer Science and research and report on recent developments and the outlook for the future in the area that you have chos

How to join to mwseries from power builder 8.0, Using CICS Transaction Gate...

Using CICS Transaction Gateway we can join MQ Series with Power Builder 8.0

What are event and its types, What are event and its types? An event is...

What are event and its types? An event is an occurrence at a point in time, like user depresses left button. Event happens instantaneously with regard to time scale. Type

How do we bind keys to menus for shortcuts in gimp, Make ensure that "Use d...

Make ensure that "Use dynamic keyboard shortcuts" option in "Interface" tab of Preferences dialog is enabled, then go to the menu selection you are interested in. Keeping it select

excitation diagram indicating , a.  Sketch the excitation diagram indicati...

a.  Sketch the excitation diagram indicating the last states and next states. b. Build the circuit using a Synchronous Counter with JK FF and NAND gates only. Replicate the circ

General registers in a processor, In this segment, we will give very brief ...

In this segment, we will give very brief details of registers of a RISC system known as MIPS. MIPS is a register-to-register or load/store architecture and employs three address

Execution error and compilation error, Execution error and compilation erro...

Execution error and compilation error: Errors like as mismatch of data types or array out of bound error are called as execution errors or runtime errors. These errors are us

High level expertise, The most useful feature of an expert system is the h...

The most useful feature of an expert system is the high level expertise it provides to aid in problem solving. This expertise can represent the best thinking of the top

What do you understand by scan codes, Q. What do you understand by Scan Cod...

Q. What do you understand by Scan Codes? A scan code is a code produced by a microprocessor in keyboard when a key is pressed and is unique to key struck. When this code is rec

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd