Public key cryptography, Other Subject

Public Key Cryptography

Today's asymmetric or public key cryptography systems are a significant development over conventional symmetric cryptography systems in that they permit two parties to swap data privately in the existence of possible eavesdroppers, without earlier agreeing on a "shared secret." Such a system is a called "asymmetric" because it is based on the thought of a matched cryptographic key pair in which a cryptographic key is no longer a simple "shared secret," but rather is divide into two sub keys, the private key and public key.

Abstractly, a participant wanting to receive encrypted communications using an asymmetric cryptography system first generates such a key pair, keeping the private-key portion as a secret and "publishing" the public-key portion to all parties that want to encrypt data for that participant. Because enciphering data requires only access to the public key, and decrypting data requires the private key, such a system in principle can sidestep the first layer of difficulty in the key organization problem because no common secret need be exchanged.

Posted Date: 10/12/2012 8:18:23 AM | Location : United States







Related Discussions:- Public key cryptography, Assignment Help, Ask Question on Public key cryptography, Get Answer, Expert's Help, Public key cryptography Discussions

Write discussion on Public key cryptography
Your posts are moderated
Related Questions
Describe the factors which decide the broad area of Scientific activity?

branches of embryology

benefits of integrating inbound and outbound transport system in the movement of goods

Use of Signer Certificates in Browsers Digital certificates previously play a primary role in Internet-based cryptography systems. For instance, consider the case of a secure W


A large unit manufacturing electrical goods which has been known for its liberal personnel policies and fringe benefits is facing the problem of low productivity and high absenteei

Mention the Aims of Education in present scenario. in 250 words


Question: The experience of growing old will bring with it many emotional and social traumas. These will be lived differently by those concerned and in some cases will need cou

BUSINESS PROCESS ORIENTATION (BPO) The idea of BPO is used consistently with Server markets. The idea of business process orientation (BPO) is stand upon the work of Deming (Wa