Asymmetric encryption-cryptography, Computer Network Security

Asymmetric Encryption

Asymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the message. This method is frequently called as public key encryption. For instance, If Key A is used to encrypt the message, only Key B can decrypt it. Figure given to us shows the example of Asymmetric Encryption.This method has its maximum value when one key is used as a private key (key is kept secret, known to the owner of key pair only) and the other key serves as public key (key is stored in public location, anyone can use it easily).

These algorithms are one way functions. A one way function is simple to calculate in one direction, but complex to compute in opposite direction.

RSA – This is the popular public key encryption mechanism, whose name is derived from Rivest Shamir Adleman (developers of algorithms). The RSA algorithm was the 1st popular public key encryption algorithm developed and published for commercial use. It has been implanted in Microsoft’s and Netscape’s web browsers.

Posted Date: 10/9/2012 2:30:21 AM | Location : United States

Related Discussions:- Asymmetric encryption-cryptography, Assignment Help, Ask Question on Asymmetric encryption-cryptography, Get Answer, Expert's Help, Asymmetric encryption-cryptography Discussions

Write discussion on Asymmetric encryption-cryptography
Your posts are moderated
Related Questions
BUS TOPOLOGY In a bus topology all devices are attached to a single long cable and any device can send data to any other device. For this function, coordination is needed to d

Question : (a) "Pulse Code Modulation (PCM), as used in telephony, samples a signal at 8 kHz using 256 quantization levels". Outline how this scheme works with the help of ske

Project Name : Computer Adaptive Test Role : Day to Day interaction with Client. Involved in Requirement Gathering, Estimation.Involved with Stellent design and architectur

Cryptographic algorithms Cryptographic algorithms are broadly classified into two broad categories. They are stated below 1.  Symmetric Encryption and 2.  Asymmetric Encryptio

QUESTION a) Consider the speed of propagation of an electrical signal is same to 2x10 8 m/s, evaluate the ratio of the propagation delay to the transmit time for the given typ

Issue-Specific Security Policy (ISSP) The ISSP addresses specific areas of technology, needs frequent updates and having statement on organization’s position on a particular iss

Innovative nature of triple key management The triple key management scheme provides secure services by combining different techniques whic contribute to the security and priv

Confidentiality Confidentiality of information ensures that only those with sufficient privileges may access specific information. When unauthorized individuals can access inform

A Certificate presents an organization in an official digital form. This is same to an electronic identity card which serves the purpose of Identifying the owner of the certificate