Advantages & disadvantages of public-key cryptography, Computer Engineering

Assignment Help:

Advantages & Disadvantages

Enhanced security and convenience: private keys never require be transmitting or revealing to anyone. 

They can givce a method for digital signatures

 Public-key authentication prevents repudiation; every user has sole responsibility for protecting his or her private key. This property of public-key authentication is often known as non-repudiation. 

A disadvantage of using public-key cryptography for encryption is speed

 For encryption, the best solution is to join public- and secret-key systems.

The public-key system can be used to encrypt a secret key, which is used to encrypt the bulk of a file or message. Like a protocol is known as a digital envelope

 A successful attack on a certification authority will permit an adversary to impersonate whomever the adversary chooses to by using a public-key certificate from the compromised authority to bind a key of the adversary's choice to the name of another user. 

Public-key cryptography is not meant to change secret-key cryptography, but rather to supplement it, to make it more secure.

 


Related Discussions:- Advantages & disadvantages of public-key cryptography

Write a recursive algorithm, Write a recursive algorithm to count the numbe...

Write a recursive algorithm to count the number of right children in a binary search tree. Write the method levelCount whose header is given below. Method levelCount returns

Clustering-coefficient- artificial intelligence, This programming assignmen...

This programming assignment is about computing topological properties of Protein-Protein Interaction (PPI) networks. Recall that a PPI network is represented by a graph G=(V,E) whe

Show data representation for computation, Binary codes exist for any fundam...

Binary codes exist for any fundamental representation. Binary codes can be created for any set of discrete elements for example colors, spectrum, musical notes, chessboard position

What is called when a program is in execution, A program in execution is ca...

A program in execution is called?  Ans. When a program in execution is known as Process.

What is an arithmetic processor, Q. What is an arithmetic processor? A ...

Q. What is an arithmetic processor? A distinctive CPU necessitates most of the control and data processing hardware for implementing non-arithmetic functions. As the hardware c

Differences between flexgrid control and dbgrid control, Normal 0 ...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Performance of caches - computer architecture, Performance of caches: ...

Performance of caches:       Amdahl's Law regarding overall speed up:                  Alternatively, CPU stall can be considered:

What are the different types of bios, The  most common types are the AWARD,...

The  most common types are the AWARD,AMI, AND phoenix

Structural hazards - computer architecture, Structural hazards - computer a...

Structural hazards - computer architecture: A structural hazard takes place when a part of the processor's hardware is required by 2 or more than two instructions at the same

Explain wait for graph-resource request and allocation graph, Explain Wait ...

Explain Wait for graph (WFG) with Resource request and allocation graph (RRAG). WFG with RRAG: A graph G = (V,E) is termed as bipartite if V can be decomposed in two

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd