Question

In: Computer Science

Please Answer!!! Why is public-key cryptography be used to encrypt a symmetric key in a digital...

Please Answer!!!

  1. Why is public-key cryptography be used to encrypt a symmetric key in a digital envelope instead of encrypting the message directly?
  2. What types of data should be encrypted?
  3. When should data be encrypted?

Solutions

Expert Solution

Why is public-key cryptography be used to encrypt a symmetric key in a digital envelope instead of encrypting the message directly?

Encryption is a process of converting electronic messages into other form(cipher text) so that only authorized party can view the data.

There are two types of encryptions - symmetric and asymmetric

Symmetric encryption is a type of encryption where data is encrypted and decrypted using only one key called secret key which is exchanged during data transmission. Whereas in asymmetric key we use a pair of keys to encrypt and decrypt the data. One is called private key(personal) and other is pubic key which is known to everyone.

Public key encryption is preferred for encrypting digital envelop because private key is never exchanged for transmission of data from sender to receiver which reduces the chances of revelation of private key during transmission and hence providing confidentiality and authenticity of data. Also it is a faster technique of encryption.

Examples of public key techniques - RSA, Diffie-Hellman

What types of data should be encrypted?

Following type of data can be encrypted using public key encryption:

Databases containing large amount of confidential data.

Payment applications to prevent frauds.

For digital signatures to authenticate the owner of data or message.

When should data be encrypted?

Data should be encrypted when you send sensitive data like emails, passwords over internet to prevent third part access to your data. Apart from this data should be encrypted when it is in use on some device because some virus or malware can still access decrypted data from your device and cause damage to important data.


Related Solutions

How do we encrypt? Explain modern symmetric cryptography. Explain the digital signature scheme. Explain the cryptography...
How do we encrypt? Explain modern symmetric cryptography. Explain the digital signature scheme. Explain the cryptography tools. What is digital signature? What is steganography? Explain the protocol for secure communications.
What is the main difference between the Symmetric-Key Cryptosystem and the Public-key cryptosystem? Please give the...
What is the main difference between the Symmetric-Key Cryptosystem and the Public-key cryptosystem? Please give the main differences of the following different encryption cryptosystems: the Block Ciphers DES and AES, Hash functions and the RSA cryptosystem and the EIGamal cryptosystem.
A symmetric password is used to encrypt an insurance policy PDF. You discover that the password...
A symmetric password is used to encrypt an insurance policy PDF. You discover that the password is always 7 characters long. The first two digits is the state abbreviation (e.g. New Jersey is NJ) and the last 5 digits is the zip code where the insurance policy is created. Using brute force, how many possible combinations are there?
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Jane and Karl.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. We have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob. Include a diagram.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Jane and Karl. Show and explain every step involved.
Subject: Cryptography Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device...
Subject: Cryptography Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device in that system is asked to verify a certificate but cannot access the Certificate Revocation List database because of a denial-of-service attack. What are the possible courses of action for the device, and what are the advantages and disadvantages of each course of action?
Design a security service that provides data integrity, data confidentiality and nonrepudiation using public-key cryptography in...
Design a security service that provides data integrity, data confidentiality and nonrepudiation using public-key cryptography in a two-party communication system over an insecure channel.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT