CNS Lect 6.0
CNS Lect 6.0
2
Private-Key Cryptography
• Traditional private/secret/single key cryptography uses one key.
• Shared by both sender and receiver.
• If this key is disclosed communications are compromised.
• Also is symmetric, parties are equal.
• Hence does not protect sender from receiver forging a message &
claiming is sent by sender.
3
Public-Key Cryptography
4
Terminology Related to Asymmetric Encryption:
Asymmetric Keys
Two related keys, a public key and a private key, that are used to perform complementary operations,
such as encryption and decryption or signature generation and signature verification.
Public Key Certificate
A digital document issued and digitally signed by the private key of a Certification Authority that
binds the name of a subscriber to a public key. The certificate indicates that the subscriber identified
in the certificate has sole control and access to the corresponding private key.
Public Key (Asymmetric) Cryptographic Algorithm
A cryptographic algorithm that uses two related keys, a public key and a private key. The two keys
have the property that deriving the private key from the public key is computationally infeasible.
Public Key Infrastructure (PKI)
A set of policies, processes, server platforms, software and workstations used for the purpose of
administering certificates and public-private key pairs, including the ability to issue, maintain, and
revoke public key certificates
5
Public-Key Cryptosystems
Two keys are used-
-Public- which may be known by anybody, and can be used to encrypt
messages, and verify signatures
-Private-known only to the recipient, used to decrypt messages, and sign
(create) signatures
Asymmetric key algorithms rely on one key for encryption and a different but
related key for decryption.
These algorithms have the following important characteristics-
• It is computationally infeasible to determine the decryption key given only
knowledge of the cryptographic algorithm and the encryption key.
• Either of the two related keys can be used for encryption, with the other used for
decryption.
6
A public-key encryption scheme has six ingredients-
• Plaintext: This is the readable message or data that is fed into the
algorithm as input.
•Encryption algorithm: The encryption algorithm performs various
transformations
on the plaintext.
• Public and private keys: This is a pair of keys that have been selected so
that I one is used for encryption, the other is used for decryption. The exact
transformations performed by the algorithm depend on the public or private
key that is provided as input.
• Ciphertext: This is the scrambled message produced as output. It depends
on the plaintext and the key. For a given message, two different keys will
produce two different ciphertexts.
• Decryption algorithm: This algorithm accepts the ciphertext and the
matching key and produces the original plaintext. 7
Fig-6.1 Encryption with public key[1]
8
Fig-6.2 Encryption with private key[1]
9
• All participants have access to public keys, and private keys are
generated locally by each participant and therefore need never be
distributed.
10
Conventional and Public-Key Encryption[ 1]
11
Public-Key Cryptosystem: Secrecy
16
Reference
1. Cryptography and Network Security-Principles and Practices, William
Stallings, 2003, Pearson Education
2. Cryptography and Network Security, B.A.Forouzan,2008, MaGraw Hill
3. https://www.cryptographynotes.com
17