Professional Documents
Culture Documents
Name:-Meer Mohsin
Course:-B.Tech CSE 2nd Year (A)
Roll No:-2004310100048
CSS ASSIGNMENT
PUBLIC CRYPTOGRAPHY
Public-key cryptography, or asymmetric cryptography, is an
encryption scheme that uses two mathematically related, but not
identical, keys - a public key and a private key. Unlike symmetric
key algorithms that rely on one key to both encrypt and decrypt,
each key performs a unique function. The public key is used to
encrypt and the private key is used to decrypt.
It is computationally infeasible to compute the private key based
on the public key. Because of this, public keys can be freely shared,
allowing users an easy and convenient method for encrypting
content and verifying digital signatures, and private keys can be
kept secret, ensuring only the owners of the private keys can
decrypt content and create digital signatures.
Since public keys need to be shared but are too big to be easily
remembered, they are stored on digital certificates for secure
transport and sharing. Since private keys are not shared, they are
simply stored in the software or operating system you use, or on
hardware (e.g., USB token, hardware security module) containing
drivers that allow it to be used with your software or operating
system.
DIGITAL SIGNATURE:-
A digital signature is a mathematical scheme for verifying the authenticity
of digital messages or documents. A valid digital signature, where the
prerequisites are satisfied, gives a recipient very strong reason to believe
that the message was created by a known sender authenticity and that the
message was not altered in transit integrity.
Digital signatures are a standard element of most cryptographic protocol
suites, and are commonly used for software distribution, financial
transactions, contract management software, and in other cases where it is
important to detect forgery or tampering.
Digital signatures are often used to implement electronic signatures, which
includes any electronic data that carries the intent of a signature, but not all
electronic signatures use digital signatures. Electronic signatures have
legal significance in some countries, including Canada, South Africa, the
United States, Algeria, Turkey, India, Brazil, Indonesia, Mexico, Saudi
Arabia, Uruguay, Switzerland, Chile and the countries of the European
Union.
ASYMMETRIC CRYPTOGRAPY:-
Asymmetric encryption is an encryption technique that uses a pair of key
(private key and public key) for encryption and decryption. Asymmetric
encryption uses the public key for the encryption of the message and the
private key for the decryption of the message.
The public key is freely available to anyone who is interested in sending the
message. The private key is kept secret with the receiver of the message. Any
message that is encrypted by the public key and the algorithm, is decrypted
using the same the algorithm and the matching private key of corresponding
public key.
The asymmetric
encryption algorithm execution is slow. As asymmetric encryption algorithm
are complex in nature and have the high computational burden. Hence, the
asymmetric encryption is used for securely exchanging the keys instead of the
bulk data transmission.
Asymmetric encryption is generally used for establishing a secure channel over
the non-secure medium like the internet. The most common asymmetric
encryption algorithm are Diffie-Hellman and RSA algorithm.
CSS Assignment