0
Public-key Cryptography KUNDAN KR. PANDEY ROLL NO -   0509014044 COURSE-  MCA 5 TH  SEM. IEC-CET,GREATER NOIDA.
Cryptography <ul><li>Encoding a message in a way that only the communicating parties can interpret it </li></ul>Encryption...
Cryptography <ul><li>Definition – the art of writing or solving codes </li></ul><ul><li>Origins in ancient Egypt </li></ul...
Secret-key Cryptography <ul><li>Also known as symmetric cryptography </li></ul><ul><li>Users have unique public keys, but ...
Secret-key Cryptography <ul><li>Not ideal because it requires a secure exchange of private keys, which is not always possi...
Public-key Cryptography <ul><li>Also called asymmetric cryptography </li></ul><ul><li>Participants have both unique privat...
Public-key encryption <ul><li>Intended recipient gives sender his or her public key </li></ul><ul><li>Sender encrypts a me...
Digital Signatures <ul><li>Serves as a verifiable seal or signature to confirm the authenticity of sender and integrity of...
Digital Signatures <ul><li>Provide no time stamping </li></ul><ul><li>The compromise of a sender’s private key throws all ...
Vulnerabilities <ul><li>Public-key algorithms require longer key sizes than secret-key algorithms, and can be vulnerable t...
Certificate Authorities <ul><li>Trusted third party that verifies identity of sender and issues digital certificate indica...
Thanks for your Participation & Co-operation
Upcoming SlideShare
Loading in...5
×

Public Key Cryptography

790

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
790
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
38
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Public Key Cryptography"

  1. 1. Public-key Cryptography KUNDAN KR. PANDEY ROLL NO - 0509014044 COURSE- MCA 5 TH SEM. IEC-CET,GREATER NOIDA.
  2. 2. Cryptography <ul><li>Encoding a message in a way that only the communicating parties can interpret it </li></ul>Encryption Plaintext (P) Ciphertext (C) Key (K) Notation : Encryption: C=E K (P) Decryption: P = D K (P)
  3. 3. Cryptography <ul><li>Definition – the art of writing or solving codes </li></ul><ul><li>Origins in ancient Egypt </li></ul><ul><li>Use in religious writings in times of persecution </li></ul><ul><li>Important military role in both World Wars </li></ul><ul><li>Rise of modern cryptography in last half-century </li></ul>
  4. 4. Secret-key Cryptography <ul><li>Also known as symmetric cryptography </li></ul><ul><li>Users have unique public keys, but identical private keys </li></ul><ul><li>Public keys are used to encrypt a message </li></ul><ul><li>Private keys are used to decrypt a message </li></ul>
  5. 5. Secret-key Cryptography <ul><li>Not ideal because it requires a secure exchange of private keys, which is not always possible </li></ul><ul><li>Problematic as the compromise of one private key results in all private keys being compromised </li></ul>
  6. 6. Public-key Cryptography <ul><li>Also called asymmetric cryptography </li></ul><ul><li>Participants have both unique private and public keys </li></ul><ul><li>Two divisions of public-key cryptography </li></ul><ul><ul><li>Public-key encryption </li></ul></ul><ul><ul><li>Digital signatures </li></ul></ul>
  7. 7. Public-key encryption <ul><li>Intended recipient gives sender his or her public key </li></ul><ul><li>Sender encrypts a message with the recipient’s public key </li></ul><ul><li>Only the recipient’s private key can be used to decrypt a message encrypted with that public key </li></ul>
  8. 8. Digital Signatures <ul><li>Serves as a verifiable seal or signature to confirm the authenticity of sender and integrity of the message </li></ul><ul><li>Sender encrypts a message with his or her private key for authentication purposes </li></ul><ul><li>Recipient can decrypt the message with the sender’s public key to confirm the sender’s identity and the message’s integrity </li></ul>
  9. 9. Digital Signatures <ul><li>Provide no time stamping </li></ul><ul><li>The compromise of a sender’s private key throws all of the sender’s digital signatures into doubt </li></ul><ul><li>Because of the lack of time stamping, all messages signed with that key are thrown into doubt </li></ul>
  10. 10. Vulnerabilities <ul><li>Public-key algorithms require longer key sizes than secret-key algorithms, and can be vulnerable to brute-force attacks </li></ul><ul><li>Man in the middle attack </li></ul><ul><ul><li>Third party intercepts message </li></ul></ul><ul><ul><li>After decrypting, modifying, and encrypting message, third party passes message along to intended recipient without suspicion </li></ul></ul>
  11. 11. Certificate Authorities <ul><li>Trusted third party that verifies identity of sender and issues digital certificate indicating authorization </li></ul><ul><li>Has been implemented in web browsing security such as SSL </li></ul><ul><li>Helps prevent man in the middle attacks </li></ul>
  12. 12. Thanks for your Participation & Co-operation
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×