Question

In: Computer Science

Demonstrate why is not enough to use an asymmetric crypting scheme such as RSA to allow...

Demonstrate why is not enough to use an asymmetric crypting scheme such as RSA to allow two parties to securely exchange messages? What is the technology to deal with the problem?

Solutions

Expert Solution

Rivest–Shamir–Adleman (RSA) asymmetric encrypting scheme. It is one of the oldest. RSA is not used because it is relatively a slow algorithm when it comes to the same computer encrypting large data, hence cannot be used for directly encrypting user data. Hence, for this purpose, it makes use of a third party for verifying the reliability of public keys. Also, data or message that is transferred through the RSA algorithm has the potential of being attacked and compromised by middlemen, carrying out a Man-In-The-Middle attack manipulating the public key system. Another concern is its public keys used for encryption are not authenticated. On the other hand, in case the private key is lost, it may not be able to repair it and the message cannot be decrypted by anyone, even by the receiver at the destination node. Additionally, the algorithm requires more computation resources, more than that is requires for single-key encryption.

* The algorithms' key is too large and hence, it consumes a lot of calculation time.
* It takes time for key generation.

* It is not safe to use the same RSA key pair to sign and encrypt i.e., to encrypt/decrypt and to sign/verify. The same key should never be used for more than one scheme.

The technology to deal with this particular problem of "key being too large" is using the faster "Elliptic Curve Cryptography (ECC)" that uses smaller key or message sizes when compared to RSA, to achieve the same security level. ECC can be used as an alternative to RSA to implement public-key cryptography. ECC generates faster, more efficient, and smaller cryptographic keys. It requires the hackers to compute an elliptic curve discrete logarithm, which is difficult than factoring (as compared to RSA), to break ECC. The outcome is ECC key sizes are smaller in comparison with RSA's requirement. Also, ECC provides equivalent security, consuming lower computing, and battery resources.


Related Solutions

Consider the following 3-person encryption scheme based on RSA. L (can be trusted in this case)...
Consider the following 3-person encryption scheme based on RSA. L (can be trusted in this case) generates two large primes p and q, calculates both n and φ(n). L also chooses k1, k2 and k3 such that GCD(ki,n) = 1 and k1k2k3 ≡ 1 mod φ(n). Keys are securely distributed to three others as follows: G: <n,k1,k2 > J: < n, k2, k3 > Z: < n, k3, k1 > Answer the following questions. (a) G has a message M1...
Write a GUI based Python program that will allow the user to perform (i) generate RSA...
Write a GUI based Python program that will allow the user to perform (i) generate RSA keys, (ii) encrypt a given message and (iii) decrypt the message without using any cryptographic library. Your program will generate the values of p unless the user provides them manually. Then the program will generate the keys (private and public). Then the program will allow the user to enter his/her message to be encrypted. Finally, the program will perform the decryption operation as well....
Develop an analysis scheme that would allow you to take a solution that was said to...
Develop an analysis scheme that would allow you to take a solution that was said to contain any or all of Ag+,Ba2+,Co2+,Pb2+, and Zn2+ cations and would confirm or deny the presence of each of these ions in the solution.
Describe two empirical studies that suggest demonstrate the market effects of asymmetric information and adverse selection.
Describe two empirical studies that suggest demonstrate the market effects of asymmetric information and adverse selection.
Describe two empirical studies that suggest demonstrate the market effects of asymmetric information and adverse selection.
Describe two empirical studies that suggest demonstrate the market effects of asymmetric information and adverse selection.
It is desired to designed a given automobile to allow enough headroom to accommodate comfortably all...
It is desired to designed a given automobile to allow enough headroom to accommodate comfortably all but the tallest 5%mof the people who drive. Former studies indicate that the 95th percentile was 70.3 inches. In order to see if the former studies are still valid, a random sample of size 100 is selected. It is found that the 12 tallest persons in the sample have the following heights. 72.6, 70.0, 71.3, 70.5, 70.8, 76.0, 70.1, 72.5, 71.1, 70.6, 71.9, 72.8...
Use Scheme Language Write a Scheme function that takes a list and returns a list identical...
Use Scheme Language Write a Scheme function that takes a list and returns a list identical to the parameter except the third element has been deleted. For example, (deleteitem '(a b c d e)) returns ‘(a b d e) ; (deleteitem '(a b (c d) e)) returns ‘(a b e).
Why is the Ramachandran Plot for Glycine symmetric and why is the plot asymmetric for all...
Why is the Ramachandran Plot for Glycine symmetric and why is the plot asymmetric for all amino acids except (glycine, proline, pre-proline)?
Many projects do not allow enough time and become rushed at the end. How does the...
Many projects do not allow enough time and become rushed at the end. How does the Project Manager prevent this from happening?
If you are asked to design to allow enough Natural light sky component into your house...
If you are asked to design to allow enough Natural light sky component into your house , then suggest what ways would be most applicable for your house, considering its orientation and site also?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT