Public key cryptography encryption, Computer Network Security

Assignment Help:

What do you understand by the term encryption? Also describe the public key cryptography Encryption:

Encryption is a method of converting plain text into cipher text. Using this method, security of data can be achieved effectively. An encrypted file can be decrypted if the user has the capability of accessing a secret key or password. In this context, unencrypted data is referred to as plain text where as encrypted data is referred to as cipher text.

415_encryption.png

Figure 7.1: Encryption process
The below written are the two major types of encryption,
1. The Symmetric encryption
2. The Asymmetric encryption.
1. Symmetric Encryption is defined below
Symmetric encryption is also called as private key or the secret key encryption. In this, only one secret key is needed for the encryption and decryption of the message. This key is shared by sender and recipient both. It is an easy process when compared to asymmetric encryption.
2. Asymmetric Encryption is defined below
Asymmetric encryption is also called as pubic key encryption. In this, two keys are required for encryption and decryption of a message that is a public key and a private key. Private key should be reserved secret for the security purposes while the other key should be shared by sender and recipient both. It is a complex and time consuming process when compared to symmetric encryption.
Public key Cryptography is defined below
Public key cryptography was invented by the Diffie and 1-lehman in year 1976. For this very reason, it is sometimes called as Diffie-Heliman encryption. Public key cryptography is also called as asymmetric cryptography. It is the form of cryptography in which the user has a pair of cryptographic keys such as public key and private key. The private-key is kept secret, whereas the public key is distributed broadly. A message or text data which is to be encrypted  
 
with the public-key can be decrypted only by making use of the corresponding private key. For example, when Johny wants to send the secure message to Sunny, he uses Sunny’s public key to encrypt the message. Sunny then uses his own private key to decrypt it.
A public key cryptography/encryption comprises of the five elements stated below. They
 
Are,
 
(i)  Text data/Message
(ii)  Encryption algorithm
(iii) Public key and private key (iv) Cipher text/Unreadable text (v) Decryption algorithm.
 
(i)  Text data/Message is described below:
This can be any input data, like text data or message. For instance, Johny is a user of the computer and wants to send his message, M=“Hello” securely to friend Sunny, who is also a user of the computer.
(ii) Encryption Algorithm is described below:
To encrypt the message, an encryption algorithm performs particular transformation on it. There are many encryption algorithms but the RSA public key encryption algorithm is mainly used to perform the particular transformations or calculations on the text data or the message.
For instance, Johny uses the public key of the Sunny and encrypted his message by using the RSA algorithm.
(iii) Public Key and Private Key are described below:
These pair of keys is used to encrypt and decrypt the desired message respectively. The private key is always kept undisclosed, whereas public key is broadly distributed.
For instance, Johny uses a public key of Sunny to encrypt his message, whereas Sunny uses his private key to decrypt Johny’s message as shown in the figure drawn below.
(iv) Cipher text/Unreadable Text described below:
Once the encryption is performed on the text data it is in unreadable format that is it cannot be read by the human beings.
For instance,  Johny’s  message  has converted  into the unreadable  from so that nobody except Sunny can read his message, as he has the  corresponding private key for that  particular message.
(v) Decryption Algorithm is described below
A decryption algorithm takes the unreadable text and the corresponding key of it to original text.  Thus, we can say that the decryption algorithm is the reverse of the encryption algorithm.
For instance, decryption algorithm takes the unreadable text of the Johny and also takes the Sunny’s private key to decrypt the message and convert the unreadable text into readable form that is original text sent by Johny. As shown in the below figure drawn below

135_public_key_encription.png

Figure Public key Encryption


Related Discussions:- Public key cryptography encryption

Secure routing protocols for wireless sensor networks, Q. Secure routing Pr...

Q. Secure routing Protocols for Wireless Sensor Networks? A secure routing information protocol enables effective implementation of authentication and integrity checking defens

Cyber troll case, According to the case, The EZ Company introduced a new te...

According to the case, The EZ Company introduced a new technology, focusing on the principles of informationintegration and visualization. The company started negotiatinga saleto a

How does message switching operate, Question: Human telephone conversat...

Question: Human telephone conversations are characterized by irregular pauses, alternating with irregular bursts of speech. In contrast, communication via computers is char

Provide a labelled drawing of a standard serial port, Question 1: (a) W...

Question 1: (a) With the help of a diagram show the basic structure of a computer system. (b) Explain as fully as you can each of the parts mentioned above. (c) What are

Define repeater, Repeater known as regenerator ; it is an electronic mac...

Repeater known as regenerator ; it is an electronic machine that performs only at physical layer. It gets the signal in the network before it becomes loss or weak, recreates the

What are the ethical issues and implications, An injunction to 'think ethic...

An injunction to 'think ethically' about a situation is not helpful. Perhaps if one has a background in moral philosophy this would work, but usually both students and IT professio

Cryptographic hash functions, (a) (i) Bob has public RSA key (n = 77, e...

(a) (i) Bob has public RSA key (n = 77, e = 7). Show that Bob's private key is (d = 43). (ii) Alice wants to send the message m = 13 to Bob. She encrypts the message usi

People, People,Procedures,Data Asset Identification-Risk Management Th...

People,Procedures,Data Asset Identification-Risk Management The human resources, data information and documentation assets are more difficult to identify. People having knowle

Important network security services, Question: (a) Consider that you en...

Question: (a) Consider that you enter the given URL in the address bar of a popular web client and that both the client and server accepts HTTP version 1.1. i. What can be t

Basic types of agent in order of increasing generality, Question 1: (a)...

Question 1: (a) Define Artificial Intelligence. (b) Briefly describe the categories for the definition of Artificial Intelligence. (c) Identify the four basic types of

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd