Question

In: Computer Science

What is the relationship between asymmetric encryption and digital certificates? Discuss the implications.

What is the relationship between asymmetric encryption and digital certificates? Discuss the implications.

Solutions

Expert Solution

Asymmetric cryptography, which is often known as public key cryptography, it uses both public keys and private keys for encrypting and decrypting the data. The keys are very large numbers that are paired and aren't identical. One key is shared with everyone(public) and the other is kept hidden(private). Any one key will be used to encrypt the data and on the other side the other key will be used to decrypt the data providing security to the encrypted data. Many protocols like SSL, OpenPGP, etc. use this method to encrypt and decrypt the data and for digital signatures.

For asymmetric encryption to provide confidentiality, integrity, authenticity and non-repudiation, users and systems must be sure that the public key is authentic, and that it belongs to the person or entity claimed and it has not been falsified or replaced by a public key by a malicious third person. A very common approach is  public key infrastructure (PKI) where the trusted certificate authorities certify ownership of key pairs and certificates.

The benefits of asymmetric cryptography are:

  • The distribution of keys problem is eliminated by this as there's no need of exchange of keys.
  • Security is increased as the private keys aren't exchanged  
  • The use of digital certificates helps receiver verify that the message has come from a valid sender.

There are some disadvantages too:

  • It is slow compared to the symmetric cryptography.
  • If anyone loses the private key, he can't decrypt the message anymore.
  • If a hacker gets the private key, then he can decrypt all the messages.

Related Solutions

Use one sentence to briefly describe the difference between symmetric encryption and asymmetric encryption.
Use one sentence to briefly describe the difference between symmetric encryption and asymmetric encryption.
Explain the concept of asymmetric information in general. Discuss the implications of asymmetric information for the...
Explain the concept of asymmetric information in general. Discuss the implications of asymmetric information for the market of deposits, the credit market and the inter-bank market. [50 marks]
What is asymmetric view? Explain the relationship(if any) between the EMH, the asymmetric view, and the...
What is asymmetric view? Explain the relationship(if any) between the EMH, the asymmetric view, and the CAPM.
(e) Briefly discuss the implications of the Capital Asset Pricing Model for the relationship between the...
(e) Briefly discuss the implications of the Capital Asset Pricing Model for the relationship between the current spot price of an asset and the discount offered by the seller of a futures contract.
Explain the relationship (If any) between the EMH, the asymmetric view, and the CAPM.
Explain the relationship (If any) between the EMH, the asymmetric view, and the CAPM.
Question 3 Briefly discuss the implications of the Capital Asset Pricing Model for the relationship between...
Question 3 Briefly discuss the implications of the Capital Asset Pricing Model for the relationship between the current spot price of an asset and the discount offered by the seller of a futures contract. (100 words)
Based on the Afrobarometer, what are the implications of social change for the relationship between trust...
Based on the Afrobarometer, what are the implications of social change for the relationship between trust in police and the presence of democracy?
Q2 .what is relationship between E-BUSINESS ,E-COMMERCE AND DIGITAL BUSINESS ?
Q2 .what is relationship between E-BUSINESS ,E-COMMERCE AND DIGITAL BUSINESS ?
What is the relationship on average for large, Internet-based technology companies? Discuss procedure and implications.
What is the relationship on average for large, Internet-based technology companies? Discuss procedure and implications.
Discuss how different types of encryption systems work, and explain how digital signatures provide the means...
Discuss how different types of encryption systems work, and explain how digital signatures provide the means for creating legally-enforceable contracts.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT