Asymmetric encryption-cryptography, Computer Network Security

Asymmetric Encryption

Asymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the message. This method is frequently called as public key encryption. For instance, If Key A is used to encrypt the message, only Key B can decrypt it. Figure given to us shows the example of Asymmetric Encryption.This method has its maximum value when one key is used as a private key (key is kept secret, known to the owner of key pair only) and the other key serves as public key (key is stored in public location, anyone can use it easily).

These algorithms are one way functions. A one way function is simple to calculate in one direction, but complex to compute in opposite direction.

RSA – This is the popular public key encryption mechanism, whose name is derived from Rivest Shamir Adleman (developers of algorithms). The RSA algorithm was the 1st popular public key encryption algorithm developed and published for commercial use. It has been implanted in Microsoft’s and Netscape’s web browsers.

Posted Date: 10/9/2012 2:30:21 AM | Location : United States







Related Discussions:- Asymmetric encryption-cryptography, Assignment Help, Ask Question on Asymmetric encryption-cryptography, Get Answer, Expert's Help, Asymmetric encryption-cryptography Discussions

Write discussion on Asymmetric encryption-cryptography
Your posts are moderated
Related Questions
For this assessment, students must research and analyse two different scenarios. The two scenarios must be chosen from those described below and submitted as one Microsoft PowerPoi

IPV6 NEXT HEADER It is given in the figure below:

QUESTION: (a) Briefly explain the steps involved in Network Simplex Method. (b) What data structures you would expect in the Network Simplex Method. Show the data struct

Encode the following plaintext, using the Caesar cipher: LORD OF THE RINGS b) The following ciphertext jw njbh lxmn cx kanjt has been encoded using a

Question : (a) There are two approaches for providing confidentiality for packets in a network using symmetric encryption: End-to-End Encryption and Link Encryption. State wh

Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t


In this section, you should create a program that emulates a GBN node. Two GBN nodes will be running to send packets to each other through the UDP protocol. For emulation purpose,

what is the guaranteed quality of this coursework? how many days it take for 10-12 pages? how much will be? thanks

Question 1:  Describe the functioning of cloud computing. Question 2: Discuss on "Platform as a Service". Question 3: Discuss the steps involved in effective co