Question

In: Computer Science

3. Public Key Cryptography involves the use of two keys: a public key and a private...

3. Public Key Cryptography involves the use of two keys: a public key and a private key. Explain the use of each key

Solutions

Expert Solution

PUBLIC KEY CRYPTOGRAPHY:

It is a cryptographic algorithm, also known as asymmetric cryptography which uses both Private Key and Public Key. These Keys are nothing but randomly generated numbers.

(i) Public Key: The name itself states the behaviour of the key. The Public Key is made available to the public that can be used by the users.

(ii) Private Key: The Private Key is confidential and is not known by others except the owner.

Both the keys are related to each other mathematically, if the data is encrypted by Public key then the data can only be decrypted by its corresponding Private Key (Vice Versa). The Private Key only has the ability to decrypt the data.

Example: Person ‘A’ wants to send sensitive data to Person ‘B’ and he wants it to be secure from others, Person ‘A’ encrypts the data with the Public Key and sends it to Person ‘B’. Person ‘B’ has a corresponding Private Key to Decrypt it. Person ‘B’ can now decrypt it and use it.

There can be a chance that some Person ‘C’ steals the data before the data is delivered to the Person ‘B’. If this happens, still Person ‘C’ cannot read or use the data as it is encrypted and can only be decrypted by the Private Key which is only accessible to Person ‘B’.

Hence, Both keys are required to encrypt or decrypt the data in order to send/receive the sensitive data.


Related Solutions

WHAT ARE THE DIFFERENCES BETWEEN PUBLIC KEYS AND PRIVATE KEYS IN TERMS OF ENCRYPTION METHODS AND...
WHAT ARE THE DIFFERENCES BETWEEN PUBLIC KEYS AND PRIVATE KEYS IN TERMS OF ENCRYPTION METHODS AND BITS WISE UNDERSTANDING?
Please Answer!!! Why is public-key cryptography be used to encrypt a symmetric key in a digital...
Please Answer!!! Why is public-key cryptography be used to encrypt a symmetric key in a digital envelope instead of encrypting the message directly? What types of data should be encrypted? When should data be encrypted?
Q3. Privacy-Preserving Computation using Public-Key Cryptography (Marks: 3+5 = 8) Say, Alice wants to multiply two...
Q3. Privacy-Preserving Computation using Public-Key Cryptography (Marks: 3+5 = 8) Say, Alice wants to multiply two numbers (M1 and M2) and send the result to Bob. That is, Alice is the sender and Bob is the receiver. However, Alice does not have the computation power to multiply two numbers. Therefore, she decides to send both numbers to a cloud server. Though the cloud server has the computation power, it cannot be trusted. As a result, Alice relies on the Homomorphic...
4NCA: 4.7 What is a nonce? 4.8 What are two different uses of public-key cryptography related...
4NCA: 4.7 What is a nonce? 4.8 What are two different uses of public-key cryptography related to key distribution? 4.9 What are the essential ingredients of a public-key directory? 4.10 What is a public-key certificate? 4.11 What are the requirements for the use of a public-key certificate scheme? 4.12 What is the purpose of the X.509 standard? 4.13 What is a chain of certificates? 4.14 How is an X.509 certificate revoked?
Cryptography*** For DES, what is the probability that two different keys will encrypt atleast 1 plaintext...
Cryptography*** For DES, what is the probability that two different keys will encrypt atleast 1 plaintext message to the same ciphertext output?
given a hash finction H(), and an RSA encrypting algorithm. The public and private keys for...
given a hash finction H(), and an RSA encrypting algorithm. The public and private keys for Alice are PUa, and PRa, respectively. A. Describe how Alice can produce a digital siguature of a message "M. and how Bob can verify the sigature. B. Does the process described in part (a) above provide authentication? Give reason.
Question 4: A key ring has 10 keys. Two of these keys are the ones required...
Question 4: A key ring has 10 keys. Two of these keys are the ones required to open a pair of locks on a safety deposit box. It is virtually impossible to tell the keys apart by just looking at them. If the keys are tried one-by-one, what is the probability that the first three keys tried will not open one of the locks and the fourth will?
Suppose the following: James’ public key = Kj, James’ private key = Kj-1 Randy’s public key...
Suppose the following: James’ public key = Kj, James’ private key = Kj-1 Randy’s public key = Kr, Randy’s private key = Kr-1 Each person’s public key is known to others; Each one’s private key is only known to the owner Explain how Randy can send a plaintext P to James secretly Explain how James can verify if a plaintext P is sent from Randy Explain how Randy can verify if a plaintext P is sent from James and at...
In the RSA public-key encryption scheme, each user has a public key, e, and a private...
In the RSA public-key encryption scheme, each user has a public key, e, and a private key, d. Suppose Alice leaks her private key. Rather than generating a new modulus, she decides to generate a new public key and a new private key. Is this safe? why or why not?
Subject: Cryptography Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device...
Subject: Cryptography Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device in that system is asked to verify a certificate but cannot access the Certificate Revocation List database because of a denial-of-service attack. What are the possible courses of action for the device, and what are the advantages and disadvantages of each course of action?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT