0% found this document useful (0 votes)
42 views

CNS Lect 6.0

1. Public-key cryptography uses two related keys, a public key and a private key, to secure communications and verify digital signatures. This solves issues with traditional private/secret key cryptography around key distribution and verification. 2. Asymmetric encryption algorithms rely on different keys for encryption and decryption. The public key can encrypt messages but not decrypt, while the private key decrypts but does not encrypt. 3. Applications of public-key cryptography include encryption/decryption of messages, digital signatures to authenticate messages, and key exchange to securely share session keys.

Uploaded by

Sameer Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views

CNS Lect 6.0

1. Public-key cryptography uses two related keys, a public key and a private key, to secure communications and verify digital signatures. This solves issues with traditional private/secret key cryptography around key distribution and verification. 2. Asymmetric encryption algorithms rely on different keys for encryption and decryption. The public key can encrypt messages but not decrypt, while the private key decrypts but does not encrypt. 3. Applications of public-key cryptography include encryption/decryption of messages, digital signatures to authenticate messages, and key exchange to securely share session keys.

Uploaded by

Sameer Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Cryptography &N/W Security

B.Tech. (IT), VII Semester

Dept. Of Information Technology, SMIT


Public Key Cryptography

2
Private-Key Cryptography
• Traditional private/secret/single key cryptography uses one key.
• Shared by both sender and receiver.
• If this key is disclosed communications are compromised.
• Also is symmetric, parties are equal.
• Hence does not protect sender from receiver forging a message &
claiming is sent by sender.

3
Public-Key Cryptography

-The concept of public-key cryptography evolved in an attempt to tackle


two of the most difficult problems associated with symmetric
encryption.
Key Distribution- how to have secure communications in general
without having to trust a KDC with your key
Digital Signature-– how to verify a message comes intact from the
claimed sender

4
Terminology Related to Asymmetric Encryption:
Asymmetric Keys
Two related keys, a public key and a private key, that are used to perform complementary operations,
such as encryption and decryption or signature generation and signature verification.
Public Key Certificate
A digital document issued and digitally signed by the private key of a Certification Authority that
binds the name of a subscriber to a public key. The certificate indicates that the subscriber identified
in the certificate has sole control and access to the corresponding private key.
Public Key (Asymmetric) Cryptographic Algorithm
A cryptographic algorithm that uses two related keys, a public key and a private key. The two keys
have the property that deriving the private key from the public key is computationally infeasible.
Public Key Infrastructure (PKI)
A set of policies, processes, server platforms, software and workstations used for the purpose of
administering certificates and public-private key pairs, including the ability to issue, maintain, and
revoke public key certificates

5
Public-Key Cryptosystems
 Two keys are used-
-Public- which may be known by anybody, and can be used to encrypt
messages, and verify signatures
-Private-known only to the recipient, used to decrypt messages, and sign
(create) signatures
 Asymmetric key algorithms rely on one key for encryption and a different but
related key for decryption.
These algorithms have the following important characteristics-
• It is computationally infeasible to determine the decryption key given only
knowledge of the cryptographic algorithm and the encryption key.

• Either of the two related keys can be used for encryption, with the other used for
decryption.
6
A public-key encryption scheme has six ingredients-
• Plaintext: This is the readable message or data that is fed into the
algorithm as input.
•Encryption algorithm: The encryption algorithm performs various
transformations
on the plaintext.
• Public and private keys: This is a pair of keys that have been selected so
that I one is used for encryption, the other is used for decryption. The exact
transformations performed by the algorithm depend on the public or private
key that is provided as input.
• Ciphertext: This is the scrambled message produced as output. It depends
on the plaintext and the key. For a given message, two different keys will
produce two different ciphertexts.
• Decryption algorithm: This algorithm accepts the ciphertext and the
matching key and produces the original plaintext. 7
Fig-6.1 Encryption with public key[1]
8
Fig-6.2 Encryption with private key[1]
9
• All participants have access to public keys, and private keys are
generated locally by each participant and therefore need never be
distributed.

• As long as a user’s private key remains protected and secret, incoming


communication is secure. At any time, a system can change its private
key and publish the corresponding public key to replace its old public
key.

10
Conventional and Public-Key Encryption[ 1]

11
Public-Key Cryptosystem: Secrecy

Fig-6.3 –Secrecy in public key cryptosystem[1]


12
Public-Key Cryptosystem: Authentication

Fig-6.4 –Authentication in public key cryptosystem[1] 13


Public-Key Cryptosystem: Authentication and Secrecy

Fig-6.5 –Authentication and Secrecy in public key cryptosystem[1] 14


Public-Key Cryptosystem: Authentication and Secrecy

Fig-6.5 –Authentication and Secrecy in public key cryptosystem[1] 15


Applications for Public-Key Cryptosystems
We can classify the use of public-key cryptosystems into three
categories-
• Encryption /decryption: The sender encrypts a message with the
recipient’s public key.
• Digital signature: The sender “signs” a message with its private key.
Signing is achieved by a cryptographic algorithm applied to the message
or to a small block of data that is a function of the message.
• Key exchange: Two sides cooperate to exchange a session key. Several
different approaches are possible, involving the private key(s) of one or
both parties

16
Reference
1. Cryptography and Network Security-Principles and Practices, William
Stallings, 2003, Pearson Education
2. Cryptography and Network Security, B.A.Forouzan,2008, MaGraw Hill
3. https://www.cryptographynotes.com

17

You might also like