• Public-key encryption is more secure from cryptanalysis
than symmetric encryption
• Public-key encryption has made symmetric encryption
obsolete Principles of Public – Key Cryptosystems Public-key cryptography evolved to address the two limitations of symmetric encryption
• Key Distribution : Secure communication without having
to trust a third party with your key
• Digital Signature: How to verify that a message comes
intact from the claimed sender Public – Key Cryptosystems
Public-key encryption scheme has six
ingredients • Plain Text : Input Message or Information • Encryption Algorithm: Performs various transformations on the plaintext • Public Key : for encryption • Private key : for decryption • Cipher Text: Scrambled message • Decryption Algorithm: Produces original message Public – Key Cryptosystems
Essential Steps involved are
• Each user generates a pair of keys
• Each user place one key in public register and companion
key is kept private Public – Key Cryptosystems Public – Key Cryptosystems Public – Key Cryptosystems Conventional and Public-Key Encryption Public – Key Cryptosystems: Secrecy
Essential Steps involved are
• Plain text : X= [ X1, X2, ….XM] • Public key : KUb • Private key : KRb • Cipher Text: Y= [Y1, Y2, ….YN] • Y = EKUb (X) • X = DKRb (Y) Public – Key Cryptosystems: Secrecy Public – Key Cryptosystems: Authentication
• Y = EKRa (X) • X = DKUa (Y) Public – Key Cryptosystems: Secrecy & Authentication
• Z = EKUb [EKRa (X)]
• X = DKUa [ DKRb (Z)] Applications for Public – Key Cryptosystems
Public-key cryptosystems can be classified into
three categories: • Encryption/decryption: The sender encrypts a message with the recipient’s public key • Digital signature: The sender “signs” a message with its private key • Key exchange: Two sides cooperate to exchange a session key