0% found this document useful (0 votes)
2 views

public key encryption-invert

Public key cryptography is a secure communication method using a pair of keys: a public key for encryption and a private key for decryption. It ensures confidentiality, authentication, and data integrity in digital communications. Key applications include encryption/decryption, digital signatures, and secure key exchange.

Uploaded by

ramesh yadav
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

public key encryption-invert

Public key cryptography is a secure communication method using a pair of keys: a public key for encryption and a private key for decryption. It ensures confidentiality, authentication, and data integrity in digital communications. Key applications include encryption/decryption, digital signatures, and secure key exchange.

Uploaded by

ramesh yadav
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Aptitude Engineering Mathematics Discrete Mathematics Operating System DBMS Computer Networks

Public Key Encryption


Last Updated : 24 Jun, 2024

What is Public Key Cryptography?


Public key cryptography is a method of secure communication that uses a
pair of keys, a public key, which anyone can use to encrypt messages or
verify signatures, and a private key, which is kept secret and used to decrypt
messages or sign documents. This system ensures that only the intended
recipient can read an encrypted message and that a signed message truly
comes from the claimed sender. Public key cryptography is essential for
secure internet communications, allowing for confidential messaging,
authentication of identities, and verification of data integrity.

What is a Cryptographic Key?


A cryptographic key is a piece of information used by cryptographic
algorithms to encrypt or decrypt data, authenticate identities, or generate
digital signatures. It serves as a parameter to control cryptographic
operations, ensuring the security and privacy of digital communications and
transactions.

Encryption
The process of changing the plaintext into the ciphertext is referred to as
encryption.
The encryption process consists of an algorithm and a key. The key is a
value independent of the plaintext.

The security of conventional encryption depends on the major two


factors

1. The Encryption algorithm


2. Secrecy of the key

Once the ciphertext is produced, it may be transmitted. The Encryption


algorithm will produce a different output depending on the specific key
being used at the time. Changing the key changes the output of the
algorithm.
Once the ciphertext is produced, it may be transmitted. Upon reception, the
ciphertext can be transformed back to the original plaintext by using a
decryption algorithm and the same key that was used for encryption.

Decryption
The process of changing the ciphertext to the plaintext that process is
known as decryption.

Public Key Encryption : Asymmetric is a form of Cryptosystem in which


encryption and decryption are performed using different keys-Public key
(known to everyone) and Private key (Secret key). This is known as Public
Key Encryption.

Characteristics of Public Encryption key


Public key Encryption is important because it is infeasible to determine
the decryption key given only the knowledge of the cryptographic
algorithm and encryption key.
Either of the two keys (Public and Private key) can be used for encryption
with other key used for decryption.
Due to Public key cryptosystem, public keys can be freely shared,
allowing users an easy and convenient method for encrypting content
and verifying digital signatures, and private keys can be kept secret,
ensuring only the owners of the private keys can decrypt content and
create digital signatures.
The most widely used public-key cryptosystem is RSA (Rivest–Shamir–
Adleman). The difficulty of finding the prime factors of a composite
number is the backbone of RSA.

Example:
Public keys of every user are present in the Public key Register. If B wants
to send a confidential message to C, then B encrypt the message using C
Public key. When C receives the message from B then C can decrypt it using
its own Private key. No other recipient other than C can decrypt the
message because only C know C’s private key.
Public Key Encryption

Components of Public Key Encryption


Plain Text: This is the message which is readable or understandable.
This message is given to the Encryption algorithm as an input.
Cipher Text: The cipher text is produced as an output of Encryption
algorithm. We cannot simply understand this message.
Encryption Algorithm: The encryption algorithm is used to convert plain
text into cipher text.
Decryption Algorithm: It accepts the cipher text as input and the
matching key (Private Key or Public key) and produces the original plain
text
Public and Private Key: One key either Private key (Secret key) or Public
Key (known to everyone) is used for encryption and other is used for
decryption

Applications of the Public Key Encryption


Encryption/Decryption: Confidentiality can be achieved using Public Key
Encryption. In this the Plain text is encrypted using receiver public key.
This will ensure that no one other than receiver private key can decrypt
the cipher text.
Digital signature: Digital signature is for senders authentication
purpose. In this sender encrypt the plain text using his own private key.
This step will make sure the authentication of the sender because
receiver can decrypt the cipher text using senders public key only.
Key exchange: This algorithm can use in both Key-management and
securely transmission of data.

You might also like