You are on page 1of 7

Public-Key Cryptography

Presentation
Public-Key Cryptography
 Use separate keys to encrypt and decrypt
– First proposed by Diffie and Hellman
– Independently proposed by Merkle (1976)

 Pair of keys for each user


– generated by the user himself
– Public key is advertised
– Private key is kept secret, and is computationally infeasible to
discover from the public key and ciphertexts
– Each key can decrypt messages encrypted using the other key

 Main Applications:
– Encryption
– Authentication (Digital Signature)
Digital Signatures
 It is a type of asymmetric cryptography used to simulate
the security properties of a signature rather than signature
form.
 It has two algorithms-one for signing it involves the user’s
secret or private key ,and one for verifying signature
involves the user’s public key.
 Digital Signature Certificate can be presented
electronically to prove your identity, to access information
or services on the Internet or to sign certain documents
digitally.
Public-Key Digital Signature
 Same as authentication
– The sender encrypts a message with his own private key
– The receiver, by decrypting, verifies key possession
Uses
 Digital signatures are a standard element of
most cryptographic protocol suites, and are
commonly used for software distribution, financial
transactions, contract management software, and
in other cases where it is important to detect
forgery or tampering.
Digital signature
How digital signature works?

You might also like