SlideShare a Scribd company logo
2
Most read
4
Most read
19
Most read
PUBLIC KEY CRYPTOGRAPHY A form of cryptography in which the key used to encrypt a message differs from the key used to decrypt it.   In public key cryptography, a user has a pair of cryptographic keys—a public key and a private key. The private key is kept secret, while the public key may be widely distributed. The two main branches of public key cryptography are: 1.  Public key encryption   2.  Digital signatures
PUBLIC KEY ENCRYPTION   A message encrypted with a recipient's public key cannot be decrypted by anyone except the recipient possessing the corresponding private key.   Actual algorithms - two linked keys: Contd .
Now Bob send Alice a message using the public key and Alice decrypt it using her private key. Step 3: Alice publish a public key to send her a message. And has a private key to decrypt it. Step 2: The most common ones have the property that Alice and Bob each own two keys, one for encryption and one for decryption  Step 1:
KEY TERMS Public and private keys: This is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption. The exact transformations performed by the algorithm depend on the public or private key that is provided as input.  Cipher text:   This is the scrambled message produced as output. It depends on the plaintext and the key. For a given message, two different keys will produce two different cipher texts.
A GENERAL APPROACH Contd .
When user1 receives the message, he decrypts it using his private key. No other recipient can decrypt the message because only user1 knows his private key  Step 4 : If user1 wishes to send a confidential message to user2, user1 encrypts the message using user2's public key.   Step 3 : Each user places public key in a public register or other accessible file. As encryption figure suggests, each user maintains a collection of public keys obtained from others.  Step 2 : Each user generates a pair of keys to be used for the encryption and decryption of messages.   Step 1 :
Authentication & security: There is some source A that produces a message in plaintext, X =[X1, X2,..., XM,]. The M elements of X are letters in some finite alphabet. The message is intended for destination B. B generates a related pair of keys: a public key, PUb, and a private key, PRb. PRb is known only to B, whereas PUb is publicly available. A generates another pair of keys: a public key, PUa, and a private key, PRa. PRa is known only to A, whereas PUa is publicly available. Contd.
Authentication & security:   Secrecy  Contd .
Secrecy in a public key encryption : B decrypt the massage using it’s private key PRb. Using it’s private key PRb and the cipher text Y it obtain the original massage X Step 2: A encrypt the massage using B’s public key PUb and send it to B. With the message X and the encryption key PUb as input, A forms the cipher text Y = [Y1, Y2,..., YN]:  Step 1:
Authentication & security:   Authentication Contd.
Authentication  in a public key encryption : B can decrypt the message using A's public key. Because the message was encrypted using A's private key, only A could have prepared the message.  Step 2: A prepares a message to B and encrypts it using A's private key before transmitting it.  Step 1:
Comparing Secrecy and Authentication In authentication technique :It is impossible to alter the message without access to A's private key, so the message is authenticated both in terms of source and in terms of data integrity. But secrecy doesn't provide this advantage. Thus the authentication is much more confidential and secure in terms of alteration of the massage.
Authentication & security: Contd.
In this case, we begin as before by encrypting a message, using the sender's private key. This provides the digital signature. Next, we encrypt again, using the receiver's public key. The final cipher text can be decrypted only by the intended receiver, who alone has the matching private key. Thus, confidentiality is provided. The disadvantage of this approach is that the public-key algorithm, which is complex, must be exercised four times rather than two in each communication.
DIGITAL SIGNATURE An authentication mechanism that enables the creator of a message to attach a code that acts as a signature.   In situations where there is not complete trust between sender and receiver, something more than authentication is needed.  1. It must verify the author and the date and time of the signature. 2. It must to authenticate the contents at the time of the signature. 3. It must be verifiable by third parties, to resolve disputes.  Thus, the digital signature function includes the authentication function.   A variety of approaches has been proposed for the digital signature function. These approaches fall into two categories: direct and arbitrated
Direct Digital Signature : The direct digital signature involves only the communicating parties (source, destination). It is assumed that the destination knows the public key of the source. A digital signature may be formed by encrypting the entire message with the sender's private key or by encrypting a hash code of the message with the sender's private key.  Arbitrated Digital Signature : The problems associated with direct digital signatures can be addressed by using an arbiter. As with direct signature schemes, there is a variety of arbitrated signature schemes. In general terms, they all operate as follows. Every signed message from a sender X to a receiver Y goes first to an arbiter A, which check it’s origin and context and then sent to Y.
Applications for Public-Key Cryptosystems Public key cryptosystem used in many systems such as: 1.Decision support system 2. RSA   Algorithm 3. Elliptic Curve  4. Diffie-Hellman key exchange
Computational cost It is computationally easy for a party B to generate a pair (public key PUb, private key PRb). It is computationally easy for a sender A, knowing the public key and the message to be encrypted, M, to generate the corresponding ciphertext: C = E(PUb, M) It is computationally easy for the receiver B to decrypt the resulting ciphertext using the private key to recover the original message: M = D(PRb, C) = D[PRb, E(PUb, M)] It is computationally infeasible for an adversary, knowing the public key, PUb, to determine the private key, PRb. It is computationally infeasible for an adversary, knowing the public key, PUb, and a ciphertext, C, to recover the original message, M. The two keys can be applied in either order: M = D[PUb, E(PRb, M)] = D[PRb, E(PUb, M)]
Weaknesses  Public-key cryptography also has vulnerabilities to attacks such as the man in the middle attack. In this situation, a malicious third party intercepts a public key on its way to one of the parties involved   Vulnerable to the man in the middle attack   Keys in asymmetric cryptography are more vulnerable to brute force attacks than in secret-key cryptography.   Vulnerable to brute force attacks   Keys in public-key cryptography, due to their unique nature, are more computationally costly than their counterparts in secret-key cryptography.  Computati-onal cost

More Related Content

PPT
Information Security & Cryptography
PPT
overview of cryptographic techniques
PPTX
Principles of public key cryptography and its Uses
PPTX
Cryptography and Information Security
PPTX
Information and network security 13 playfair cipher
PDF
SYMMETRIC CRYPTOGRAPHY
PPTX
PPTX
MAC-Message Authentication Codes
Information Security & Cryptography
overview of cryptographic techniques
Principles of public key cryptography and its Uses
Cryptography and Information Security
Information and network security 13 playfair cipher
SYMMETRIC CRYPTOGRAPHY
MAC-Message Authentication Codes

What's hot (20)

PPTX
Cryptography
PPT
X.509 Certificates
PPTX
Kerberos
PPTX
Public Key Cryptosystem
PPTX
Cryptography
PPTX
Cryptography
PPTX
3 public key cryptography
PPTX
Cryptography
PPTX
Key management and distribution
PPT
DES (Data Encryption Standard) pressentation
PPS
Message AUthentication Code
PPT
6. cryptography
PPTX
Cryptography and Network Security
PPTX
Encryption ppt
PDF
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
PDF
Web Security
PPTX
Cryptographic tools
 
PPTX
Cryptography
PDF
RSA ALGORITHM
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
Cryptography
X.509 Certificates
Kerberos
Public Key Cryptosystem
Cryptography
Cryptography
3 public key cryptography
Cryptography
Key management and distribution
DES (Data Encryption Standard) pressentation
Message AUthentication Code
6. cryptography
Cryptography and Network Security
Encryption ppt
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
Web Security
Cryptographic tools
 
Cryptography
RSA ALGORITHM
CRYPTOGRAPHY AND NETWORK SECURITY
Ad

Similar to PUBLIC KEY ENCRYPTION (20)

DOCX
Prime Numbers, Fermat’s and Euler’s theorem, discrete logarithm. ASYMMETRIC C...
PPTX
Public-Key Cryptography.pptx
PPTX
Module2.pptx
PPTX
CNS 3RD UNIT PPT.pptx
PDF
Computer security module 3
PPTX
UNIT-IV.pptx
PPTX
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
PPT
Cryptography and Message Authentication NS3
PPT
Secure Communication (Distributed computing)
PPTX
Network security
PPTX
Information and data security public key cryptography and rsa
PPT
Cryptography
DOCX
Cyber public key cryptography
PDF
Vtu network security(10 ec832) unit 3 notes.
PPTX
engineering cryptography pptxmodule 4 rsa.pptx
DOC
PDF
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
PPTX
Information and network security 31 public key cryptography
PPTX
Information and network security 32 principles of public key cryptosystems
Prime Numbers, Fermat’s and Euler’s theorem, discrete logarithm. ASYMMETRIC C...
Public-Key Cryptography.pptx
Module2.pptx
CNS 3RD UNIT PPT.pptx
Computer security module 3
UNIT-IV.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Cryptography and Message Authentication NS3
Secure Communication (Distributed computing)
Network security
Information and data security public key cryptography and rsa
Cryptography
Cyber public key cryptography
Vtu network security(10 ec832) unit 3 notes.
engineering cryptography pptxmodule 4 rsa.pptx
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
Information and network security 31 public key cryptography
Information and network security 32 principles of public key cryptosystems
Ad

Recently uploaded (20)

PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Insiders guide to clinical Medicine.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
01-Introduction-to-Information-Management.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Classroom Observation Tools for Teachers
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
master seminar digital applications in india
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Supply Chain Operations Speaking Notes -ICLT Program
Insiders guide to clinical Medicine.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
102 student loan defaulters named and shamed – Is someone you know on the list?
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Microbial diseases, their pathogenesis and prophylaxis
Anesthesia in Laparoscopic Surgery in India
01-Introduction-to-Information-Management.pdf
Basic Mud Logging Guide for educational purpose
TR - Agricultural Crops Production NC III.pdf
Classroom Observation Tools for Teachers
Week 4 Term 3 Study Techniques revisited.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Module 4: Burden of Disease Tutorial Slides S2 2025
master seminar digital applications in india
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
human mycosis Human fungal infections are called human mycosis..pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES

PUBLIC KEY ENCRYPTION

  • 1. PUBLIC KEY CRYPTOGRAPHY A form of cryptography in which the key used to encrypt a message differs from the key used to decrypt it. In public key cryptography, a user has a pair of cryptographic keys—a public key and a private key. The private key is kept secret, while the public key may be widely distributed. The two main branches of public key cryptography are: 1. Public key encryption 2. Digital signatures
  • 2. PUBLIC KEY ENCRYPTION A message encrypted with a recipient's public key cannot be decrypted by anyone except the recipient possessing the corresponding private key. Actual algorithms - two linked keys: Contd .
  • 3. Now Bob send Alice a message using the public key and Alice decrypt it using her private key. Step 3: Alice publish a public key to send her a message. And has a private key to decrypt it. Step 2: The most common ones have the property that Alice and Bob each own two keys, one for encryption and one for decryption Step 1:
  • 4. KEY TERMS Public and private keys: This is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption. The exact transformations performed by the algorithm depend on the public or private key that is provided as input. Cipher text: This is the scrambled message produced as output. It depends on the plaintext and the key. For a given message, two different keys will produce two different cipher texts.
  • 6. When user1 receives the message, he decrypts it using his private key. No other recipient can decrypt the message because only user1 knows his private key Step 4 : If user1 wishes to send a confidential message to user2, user1 encrypts the message using user2's public key. Step 3 : Each user places public key in a public register or other accessible file. As encryption figure suggests, each user maintains a collection of public keys obtained from others. Step 2 : Each user generates a pair of keys to be used for the encryption and decryption of messages. Step 1 :
  • 7. Authentication & security: There is some source A that produces a message in plaintext, X =[X1, X2,..., XM,]. The M elements of X are letters in some finite alphabet. The message is intended for destination B. B generates a related pair of keys: a public key, PUb, and a private key, PRb. PRb is known only to B, whereas PUb is publicly available. A generates another pair of keys: a public key, PUa, and a private key, PRa. PRa is known only to A, whereas PUa is publicly available. Contd.
  • 8. Authentication & security: Secrecy Contd .
  • 9. Secrecy in a public key encryption : B decrypt the massage using it’s private key PRb. Using it’s private key PRb and the cipher text Y it obtain the original massage X Step 2: A encrypt the massage using B’s public key PUb and send it to B. With the message X and the encryption key PUb as input, A forms the cipher text Y = [Y1, Y2,..., YN]: Step 1:
  • 10. Authentication & security: Authentication Contd.
  • 11. Authentication in a public key encryption : B can decrypt the message using A's public key. Because the message was encrypted using A's private key, only A could have prepared the message. Step 2: A prepares a message to B and encrypts it using A's private key before transmitting it. Step 1:
  • 12. Comparing Secrecy and Authentication In authentication technique :It is impossible to alter the message without access to A's private key, so the message is authenticated both in terms of source and in terms of data integrity. But secrecy doesn't provide this advantage. Thus the authentication is much more confidential and secure in terms of alteration of the massage.
  • 14. In this case, we begin as before by encrypting a message, using the sender's private key. This provides the digital signature. Next, we encrypt again, using the receiver's public key. The final cipher text can be decrypted only by the intended receiver, who alone has the matching private key. Thus, confidentiality is provided. The disadvantage of this approach is that the public-key algorithm, which is complex, must be exercised four times rather than two in each communication.
  • 15. DIGITAL SIGNATURE An authentication mechanism that enables the creator of a message to attach a code that acts as a signature. In situations where there is not complete trust between sender and receiver, something more than authentication is needed. 1. It must verify the author and the date and time of the signature. 2. It must to authenticate the contents at the time of the signature. 3. It must be verifiable by third parties, to resolve disputes. Thus, the digital signature function includes the authentication function. A variety of approaches has been proposed for the digital signature function. These approaches fall into two categories: direct and arbitrated
  • 16. Direct Digital Signature : The direct digital signature involves only the communicating parties (source, destination). It is assumed that the destination knows the public key of the source. A digital signature may be formed by encrypting the entire message with the sender's private key or by encrypting a hash code of the message with the sender's private key. Arbitrated Digital Signature : The problems associated with direct digital signatures can be addressed by using an arbiter. As with direct signature schemes, there is a variety of arbitrated signature schemes. In general terms, they all operate as follows. Every signed message from a sender X to a receiver Y goes first to an arbiter A, which check it’s origin and context and then sent to Y.
  • 17. Applications for Public-Key Cryptosystems Public key cryptosystem used in many systems such as: 1.Decision support system 2. RSA Algorithm 3. Elliptic Curve 4. Diffie-Hellman key exchange
  • 18. Computational cost It is computationally easy for a party B to generate a pair (public key PUb, private key PRb). It is computationally easy for a sender A, knowing the public key and the message to be encrypted, M, to generate the corresponding ciphertext: C = E(PUb, M) It is computationally easy for the receiver B to decrypt the resulting ciphertext using the private key to recover the original message: M = D(PRb, C) = D[PRb, E(PUb, M)] It is computationally infeasible for an adversary, knowing the public key, PUb, to determine the private key, PRb. It is computationally infeasible for an adversary, knowing the public key, PUb, and a ciphertext, C, to recover the original message, M. The two keys can be applied in either order: M = D[PUb, E(PRb, M)] = D[PRb, E(PUb, M)]
  • 19. Weaknesses Public-key cryptography also has vulnerabilities to attacks such as the man in the middle attack. In this situation, a malicious third party intercepts a public key on its way to one of the parties involved Vulnerable to the man in the middle attack Keys in asymmetric cryptography are more vulnerable to brute force attacks than in secret-key cryptography. Vulnerable to brute force attacks Keys in public-key cryptography, due to their unique nature, are more computationally costly than their counterparts in secret-key cryptography. Computati-onal cost