Asymmetric encryption-cryptography, Computer Network Security

Asymmetric Encryption

Asymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the message. This method is frequently called as public key encryption. For instance, If Key A is used to encrypt the message, only Key B can decrypt it. Figure given to us shows the example of Asymmetric Encryption.This method has its maximum value when one key is used as a private key (key is kept secret, known to the owner of key pair only) and the other key serves as public key (key is stored in public location, anyone can use it easily).

These algorithms are one way functions. A one way function is simple to calculate in one direction, but complex to compute in opposite direction.

RSA – This is the popular public key encryption mechanism, whose name is derived from Rivest Shamir Adleman (developers of algorithms). The RSA algorithm was the 1st popular public key encryption algorithm developed and published for commercial use. It has been implanted in Microsoft’s and Netscape’s web browsers.

Posted Date: 10/9/2012 2:30:21 AM | Location : United States







Related Discussions:- Asymmetric encryption-cryptography, Assignment Help, Ask Question on Asymmetric encryption-cryptography, Get Answer, Expert's Help, Asymmetric encryption-cryptography Discussions

Write discussion on Asymmetric encryption-cryptography
Your posts are moderated
Related Questions
Problem a) Give three reasons why traditional Network Design approach is less appropriate for many of today's networks? b) The network requires of users are organized into m

Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob ow

Enterprise Information Security Policy (EISP) EISP also known as security policy directly supports the mission of the organization and sets the strategic direction, scope, and t

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer

Management of Classified Data Management of classified data comprises of its storage, distribution, portability, and destruction of classified data. All information which is not

Simplex data exchange Simplex communication defines to communication that happens in one direction only. Two definitions have made over time: a common definition, which is des

Dynamic Packet Filtering Dynamic Packet Filtering is also referred to as stateful firewalling. Here the firewall maintains the status of connections as well. When a connection

CRC in matlab

IPV6 BASE HEADER FORMAT: It has less information than IPV4 message header. Next header shows to first extension message header. Flow label is partitioned into a TRAFFIC CLASS

QUESTION 1: a) Differentiate between a routing protocol and a routed protocol. b) Describe any three design goals of Routing protocols. c) Lists some of the features shared