Advantages and disadvantages of public key cryptography, Computer Engineering

Assignment Help:

What are the advantages and disadvantages of public key cryptography?

Advantages and Disadvantages:

Improved security and convenience: private keys never require be transmitting or revealing to anyone.
They can give a method for digital signatures

Public-key authentication protects repudiation; all users have sole responsibility for protecting his or her private key. Such property of public-key authentication is frequently termed as non-repudiation.

A drawback of using public-key cryptography for encryption is speed. The best solution for encryption is to merge public and secret-key systems.

The public-key system can be utilized to encrypt a secret key that is used to encrypt the bulk of message or a file. Such a protocol is termed as a digital envelope. A successful attack upon a certification authority will permit an adversary to impersonate whomever the adversary decides to by using a public-key certificate through the compromised authority to bind a key of the adversary's pick to the name of other user. Public-key cryptography is not implies as replace secret-key cryptography, although rather to supplement this, to make this more secure.


Related Discussions:- Advantages and disadvantages of public key cryptography

Explain the working of A/D converter, With the help of a neat diagram, expl...

With the help of a neat diagram, explain the working of a successive approximation A/D converter Ans: Successive Approximation ADC: It is the most broadly used A/D con

Explain the action of an interrupt processing routine, Explain the action o...

Explain the action of an interrupt processing routine? Action of an interrupt processing routine is as follows : 1. Save contents of registers of CPU. This action is not e

Acting rationally - artificial intelligence, Acting Rationally: "Al" C...

Acting Rationally: "Al" Capone was finally convicted for tax evasion. Were the police reacting on rationally?? To solve this puzzle, we must first look at how the performance

Determine the example - fork-join, Determine the Example - "fork-join" ...

Determine the Example - "fork-join" module initial_fork_join(); reg clk,reset,enable,data; initial begin $monitor("‰g clk=‰b reset=‰b enable=‰b data=‰b", $time, cl

Allocation of bits among opcode and operand, Allocation of Bits among Opcod...

Allocation of Bits among Opcode and Operand The trade-off here is between numbers of bits of opcode vs. the addressing capabilities. An interesting development in this regard i

Common problem with hill climbing, Common problem with Hill climbing: ...

Common problem with Hill climbing: An alternative way of justifying the problem is that the states are boards with 8 queens already on them, so an action is a movement of one

Explain activities of an operating system, List the major activities of an ...

List the major activities of an operating system with respect to memory management, secondary storage management and process management. Operating system is causes for followin

Critical section., what is critical section problem in operating system wit...

what is critical section problem in operating system with diagram

Explain session layer of osi model, Explain Session Layer of OSI Model. ...

Explain Session Layer of OSI Model. The session layer manages, establishes and terminates communication sessions. Communication sessions contain service of requests and serv

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd