You are on page 1of 16

PUBLIC-KEY ENCRYPTION

AND
DIGITAL SIGNATURES
PRESENT ED BY:
YO U S E F A L L A M - M O H A M M E D TAW F I Q - A M R TA R I Q
YO U S S E F LO T F Y - I S M A I L M O H A M M E D

Table of contents:
- Public key encryption concepts.
- Digital signature.
- RSA Public-Key Encryption Algorithm.
- Key management.
- Demo ( If time allows).

Public-Key Encryption
publicly proposed by Diffie and Hellman in 1976
is the first truly revolutionary advance in encryption in literally thousands of
years

public-key algorithms
Public key algorithms based on mathematical function or simple operations
on bit patterns

Types of keys
asymmetric : use of two separate keys like
Public key cryptography
Symmetric: use only one separate key
But when you use asymmetric way it has one disadvantage there will be no
secure in the area on key distribution and authentication

Concerning with public-key


encryption misconceptions
One is public key encryption is more secure from cryptanalysis than
symmetric encryption
. A second misconception is that public-key encryption is a
general-purpose technique that has made symmetric encryption obsolete

things that any security


encryption depends on it
1-the length of the key
2-the computational work involved in breaking a cipher

How to send an encrypted text

A public-key encryption scheme


ingredients
Plain text : this is readable message or data fed into the algorithm as input
Encryption algorithm: the encryption algorithm performs various
transformations on the plain text .

A public-key encryption scheme


ingredients
Public and private key:
This is a pair of keys that have been selected so that if
one is used for encryption the other is used for decryption.

A public-key encryption scheme


ingredients
Ciphertext : This is the scrambled message produced as output. It depends
on
the plaintext and the key.
Decryption algorithm: This algorithm accepts the ciphertext and the
matching
key and produces the original plaintext.

Digital signature
What is the Digital signature?
Example
Disadvantage of digital signature

RSA Public-Key Encryption


Algorithm
RSA founders:
Ron Rivest
Adi Shamir
Leonard Adleman

RSA Public-Key Encryption


Algorithm

KEY MANAGEMENT
In order to send a secure message:

Prepare a message.

Encrypt that message using symmetric encryption.

Attach the encrypted session key to the message and send it.

Certificate authority(CA):-

You might also like