Asymmetric encryption-cryptography, Computer Network Security

Asymmetric Encryption

Asymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the message. This method is frequently called as public key encryption. For instance, If Key A is used to encrypt the message, only Key B can decrypt it. Figure given to us shows the example of Asymmetric Encryption.This method has its maximum value when one key is used as a private key (key is kept secret, known to the owner of key pair only) and the other key serves as public key (key is stored in public location, anyone can use it easily).

These algorithms are one way functions. A one way function is simple to calculate in one direction, but complex to compute in opposite direction.

RSA – This is the popular public key encryption mechanism, whose name is derived from Rivest Shamir Adleman (developers of algorithms). The RSA algorithm was the 1st popular public key encryption algorithm developed and published for commercial use. It has been implanted in Microsoft’s and Netscape’s web browsers.

Posted Date: 10/9/2012 2:30:21 AM | Location : United States







Related Discussions:- Asymmetric encryption-cryptography, Assignment Help, Ask Question on Asymmetric encryption-cryptography, Get Answer, Expert's Help, Asymmetric encryption-cryptography Discussions

Write discussion on Asymmetric encryption-cryptography
Your posts are moderated
Related Questions
implementing password policy in organisation

Problem: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

Problem (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Describe how

CarALouer provides rental of cars to its customer on a regional basis i.e. a car is attached to a regional home-base which also houses a regional office of the company. Each regi

I am ryan, i am looking for data security and network assignment help, Do you have experts in data security?

QUESTION (a) What do you meant by data spoliation? (b) Justify the following statement: "Disk imaging differs from creating a standard backup of disk." (c) Why do yo

(a) What are the different architectures for wireless networks? (b) Explain how WEP authentication and encryption works, describe the vulnerability. (c) In what ways are secu

Question: (a) What is Network Address Translation (NAT)? Why is it used? (b) Given a following information by your ISP about your newly acquired Frame Relay connection:

(a) Illustrate what you understand by Nyquist Capacity Theorem? (b) Consider we wish to transmit at a rate of 64 kbps over a 4 kHz noisy but error-free channel. What is the mini

Ask You have been asked by a new client to assist in setting up a new computer for her coffee shop. She has just purchased the newest Apple computer from an online site. Should wou