Saturday, May 11, 2019

Public-key cryptography and information security Essay

humanity-key cryptography and information security - Essay ExamplePublic Key cryptanalysis (PKC) uses a key with two elements, a public key and a private key, for the execution of instrument of an encoding algorithm that doesnt require two parties (sender and receiver) to first exchange a whodunit key in an attempt to carry out the process of communication. In this scenario, the public key part is used for encryption entirely at the receiver side, whose private key part is applied for decryption. However, in order to constrain this communication safe it is necessary to make sure that only the intended receiver is able to addition the private part of the key. Moreover, this concept is also used in elegant implementation of digital signatures (Tschabitscher, 2011) and (Adleman, Rivest, Shamir, & Williamson, 2010). Public key cryptography is considered as extremely protected for the reason that it does not require a secret frequent key between the receiver and sender. However, o ther encryption methods and technologies that utilize a single common key to twain decrypt and encrypt information depend mutually on both parties (sender and receiver) in order to make a decision about a key ahead of time pocket of other parties finding what that key is (Kayne, 2011). The most important benefit of PKC is its excellent security and ease of use. In addition, PKC is very useful in implementing secure algorithms since there is need to have an identical key for both parties (sender and the receiver).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.