Asymmetric encryption-cryptography, Computer Network Security

Asymmetric Encryption

Asymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the message. This method is frequently called as public key encryption. For instance, If Key A is used to encrypt the message, only Key B can decrypt it. Figure given to us shows the example of Asymmetric Encryption.This method has its maximum value when one key is used as a private key (key is kept secret, known to the owner of key pair only) and the other key serves as public key (key is stored in public location, anyone can use it easily).

These algorithms are one way functions. A one way function is simple to calculate in one direction, but complex to compute in opposite direction.

RSA – This is the popular public key encryption mechanism, whose name is derived from Rivest Shamir Adleman (developers of algorithms). The RSA algorithm was the 1st popular public key encryption algorithm developed and published for commercial use. It has been implanted in Microsoft’s and Netscape’s web browsers.

Posted Date: 10/9/2012 2:30:21 AM | Location : United States







Related Discussions:- Asymmetric encryption-cryptography, Assignment Help, Ask Question on Asymmetric encryption-cryptography, Get Answer, Expert's Help, Asymmetric encryption-cryptography Discussions

Write discussion on Asymmetric encryption-cryptography
Your posts are moderated
Related Questions
Hashing is the transformation of a string of characters into a generally shorter fixed-length key or a value that presents the original string. Hashing is used to index and retri

QUESTION (a) A convex flow problem is a non linear network flow problem. Explain how a convex flow problem could be transformed into a Minimum Cost Flow problem. (b) Exp

Address resolution algorithms may be grouped into three basic types: Table lookup Closed-form computation Message Exchange 1. TABLE LOOKUP: In Table Loo

ARP RESPONSES Let's search out how does a computer know whether an incoming frame have an ARP message. The type field in the frame header defines that the frame contain an ARP

QUESTION (a) One of the biggest drawbacks that GNS3 has is that it supports only the IOS images of routers. This means that users cannot emulate Cisco switches. Suggest two sol

The first and foremost need of  any business is a role to perform for its client base, and for the spammer this will typically be the role of advertising products which, due to the

QUESTION (a) Describe the difference between static routing and dynamic routing algorithms. (b) List four functions that are performed by the Cisco IOS software during b

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer

According to the case, The EZ Company introduced a new technology, focusing on the principles of informationintegration and visualization. The company started negotiatinga saleto a

QUESTION (In this question, you will need to use the ISO 27001:2005 and ISO 27002:2005 standards) For each of the situations below, comment on the following: 1. Mention