You are on page 1of 12

Principles of Public – Key

Cryptosystems
Misconceptions Concerning Public-Key
Encryption

• Public-key encryption is more secure from cryptanalysis


than symmetric encryption

• Public-key encryption has made symmetric encryption


obsolete
Principles of Public – Key
Cryptosystems
Public-key cryptography evolved to
address the two limitations of symmetric
encryption

• Key Distribution : Secure communication without having


to trust a third party with your key

• Digital Signature: How to verify that a message comes


intact from the claimed sender
Public – Key Cryptosystems

Public-key encryption scheme has six


ingredients
• Plain Text : Input Message or Information
• Encryption Algorithm: Performs various transformations
on the plaintext
• Public Key : for encryption
• Private key : for decryption
• Cipher Text: Scrambled message
• Decryption Algorithm: Produces original message
Public – Key Cryptosystems

Essential Steps involved are


• Each user generates a pair of keys

• Each user place one key in public register and companion


key is kept private
Public – Key Cryptosystems
Public – Key Cryptosystems
Public – Key Cryptosystems
Conventional and Public-Key Encryption
Public – Key Cryptosystems: Secrecy

Essential Steps involved are


• Plain text : X= [ X1, X2, ….XM]
• Public key : KUb
• Private key : KRb
• Cipher Text: Y= [Y1, Y2, ….YN]
• Y = EKUb (X)
• X = DKRb (Y)
Public – Key Cryptosystems: Secrecy
Public – Key Cryptosystems: Authentication

• Y = EKRa (X)
• X = DKUa (Y)
Public – Key Cryptosystems: Secrecy &
Authentication

• Z = EKUb [EKRa (X)]


• X = DKUa [ DKRb (Z)]
Applications for Public – Key Cryptosystems

Public-key cryptosystems can be classified into


three categories:
• Encryption/decryption: The sender encrypts a message
with the recipient’s public key
• Digital signature: The sender “signs” a message with its
private key
• Key exchange: Two sides cooperate to exchange a session
key

You might also like