Explain the technique used in asymmetric key cryptography, Computer Engineering

Assignment Help:

Explain the technique used in the asymmetric Key Cryptography.

Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound to a single user. This key material is divided in two components:

  • A private key, to that only the user has access, and
  • A public key that may be published or distributed on request.

Each key makes a function used to transform text. The private key makes a private transformation function and the public key makes a public transformation function. The functions are inversely associated, that is, if one function is utilized to encrypt a message, another is used to decrypt the message. The order wherein the transformation functions are invoked is irrelevant. See that the key material is used to produce the transformation functions, the meaning as private key and public key not only reference the key values, although also the transformation functions. For illustration, the phrase, ''the message is encrypted by using the message recipient's public key'', implies the recipient's public key transformation function is invoked by using the recipient's public key value and the message like inputs, and a cipher text representation of the message is produced as output.

The advantage of a public-key system is as two users can communicate securely without exchanging secret keys. For illustration, assume an originator requires sending a message to a recipient, and secrecy is needed for the message. The originator encrypts the message by using the recipient's public key. Merely the recipient's private key can be utilized to decrypt the message. This is because of the computational infeasibility of inverting the public key transformation function. Conversely, without the recipient's private key, this is computationally infeasible for the interceptor to transform cipher text in its original plain text.


Related Discussions:- Explain the technique used in asymmetric key cryptography

Define the types of software life cycle, Define the types of software life ...

Define the types of software life cycle Any system progress refers to the initial part of the software life cycle: analysis, design, and implementation. During object oriented

What are qualified associations, What are qualified associations? A qua...

What are qualified associations? A qualified association is an association in which an attribute known as the qualifier disambiguates the object many associated end.

Database, what are the Database designs to avoid?

what are the Database designs to avoid?

What is efi framework, The Extensible Firmware Interface (EFI) is a specifi...

The Extensible Firmware Interface (EFI) is a specification that defines a software interface among an operating system and platform firmware. EFI is intended as a significantly imp

Where the trunks lines are run between, Trunks are the lines that run betwe...

Trunks are the lines that run between (A)  Subscribers and exchange (B)  Switching system and power plant (C) Local area network (D) Switching stations Ans:

Unit test an mvc application, Is it possible to unit test an MVC applicatio...

Is it possible to unit test an MVC application without running the controllers in an ASP.NET process? Ans) Yes, all the features in an asp.net MVC application are interface ba

Illustrate what is a centrifugal force, Q. Illustrate what is a Centrifugal...

Q. Illustrate what is a Centrifugal Force? Answer:- Centrifugal force is the force that is equivalent in magnitude but opposite in direction to the centripetal force which

Discuss program testing and debugging in detail, Discuss program testing an...

Discuss program testing and debugging in detail. In program debugging and testing significant steps are as follows: a. For the program, construction of test data b. Analy

superscalar pipelining, Put an "X" next to any of the following that are R...

Put an "X" next to any of the following that are RISC CPU characteristics that show diffrence between RISC from CISC a) has limited addressing modes b) used in Motorola 6000 pro

What is electronic cash, What is electronic cash? E-cash is cash which ...

What is electronic cash? E-cash is cash which is shown by two models. One is the on-line form of e-cash which permits for the completion of all types of internet transactions.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd