You are on page 1of 3

BNCET

Name:-Meer Mohsin
Course:-B.Tech CSE 2nd Year (A)
Roll No:-2004310100048

CSS ASSIGNMENT

PUBLIC CRYPTOGRAPHY
Public-key cryptography, or asymmetric cryptography, is an
encryption scheme that uses two mathematically related, but not
identical, keys - a public key and a private key. Unlike symmetric
key algorithms that rely on one key to both encrypt and decrypt,
each key performs a unique function. The public key is used to
encrypt and the private key is used to decrypt.
It is computationally infeasible to compute the private key based
on the public key. Because of this, public keys can be freely shared,
allowing users an easy and convenient method for encrypting
content and verifying digital signatures, and private keys can be
kept secret, ensuring only the owners of the private keys can
decrypt content and create digital signatures.
Since public keys need to be shared but are too big to be easily
remembered, they are stored on digital certificates for secure
transport and sharing. Since private keys are not shared, they are
simply stored in the software or operating system you use, or on
hardware (e.g., USB token, hardware security module) containing
drivers that allow it to be used with your software or operating
system.

DIGITAL SIGNATURE:-
A digital signature is a mathematical scheme for verifying the authenticity
of digital messages or documents. A valid digital signature, where the
prerequisites are satisfied, gives a recipient very strong reason to believe
that the message was created by a known sender authenticity and that the
message was not altered in transit integrity.
Digital signatures are a standard element of most cryptographic protocol
suites, and are commonly used for software distribution, financial
transactions, contract management software, and in other cases where it is
important to detect forgery or tampering.
Digital signatures are often used to implement electronic signatures, which
includes any electronic data that carries the intent of a signature, but not all
electronic signatures use digital signatures. Electronic signatures have
legal significance in some countries, including Canada, South Africa, the
United States, Algeria, Turkey, India, Brazil, Indonesia, Mexico, Saudi
Arabia, Uruguay, Switzerland, Chile and the countries of the European
Union.

ASYMMETRIC CRYPTOGRAPY:-
Asymmetric encryption is an encryption technique that uses a pair of key
(private key and public key) for encryption and decryption. Asymmetric
encryption uses the public key for the encryption of the message and the
private key for the decryption of the message.
The public key is freely available to anyone who is interested in sending the
message. The private key is kept secret with the receiver of the message. Any
message that is encrypted by the public key and the algorithm, is decrypted
using the same the algorithm and the matching private key of corresponding
public key.
The asymmetric
encryption algorithm execution is slow. As asymmetric encryption algorithm
are complex in nature and have the high computational burden. Hence, the
asymmetric encryption is used for securely exchanging the keys instead of the
bulk data transmission.
Asymmetric encryption is generally used for establishing a secure channel over
the non-secure medium like the internet. The most common asymmetric
encryption algorithm are Diffie-Hellman and RSA algorithm.

DNS(DOMAIN NAME SYSTEM):-


The Domain Name System (DNS) is the phonebook of the Internet.
Humans access information online through domain names, like
nytimes.com or espn.com. Web browsers interact through Internet Protocol
(IP) addresses. DNS translates domain names to IP addresses so
browsers can load Internet resources.
Each device connected to the Internet has a unique IP address which other
machines use to find the device. DNS servers eliminate the need for
humans to memorize IP addresses such as 192.168.1.1 (in IPv4), or more
complex newer alphanumeric IP addresses such as
2400:cb00:2048:1::c629:d7a2 (in IPv6).

PUBLIC KEY CRYPTOGRAPHY:-


In public key cryptography, the key distribution of public keys is done
through public key servers. When a person creates a key-pair, they keep
one key private and the other, known as the public-key, is uploaded to a
server where it can be accessed by anyone to send the user a private,
encrypted, message...
Secure Sockets Layer (SSL) uses Diffie–Hellman key exchange if the client
does not have a public-private key pair and a published certificate in the
public key infrastructure, and Public Key Cryptography if the user does
have both the keys and the credential.
Key distribution is an important issue in wireless sensor network (WSN)
design. There are many key distribution schemes in the literature that are
designed to maintain an easy and at the same time secure communication
among sensor nodes. The most accepted method of key distribution in
WSNs is key predistribution, where secret keys are placed in sensor nodes
before deployment. When the nodes are deployed over the target area, the
secret keys are used to create the network.For more info see: key
distribution in wireless sensor networks.

CSS Assignment

You might also like