How does the public key cryptography solve the drawback of private key cryptography?
|NU Year||Set: 2.(b) Marks: 5 Year: 2017|
Cryptosystems can be of two types:
• Asymmetric Cryptosystems
• Symmetric Cryptosystems
In an asymmetric cryptosystem (or public key cryptosystem), there are two different keys used for the encryption and decryption of data. The key used for encryption is kept public and so as called public key, and the decryption key is kept secret and called private key. The keys are generated in such a way that it is impossible to derive the private key from the public key. The transmitter and the receiver both have two keys in an asymmetric system. However, the private key is kept private and not sent over with the message to the receiver, although the public key is.
Asymmetric cryptosystem (or private key cryptosystem) uses only one key for both encryption and decryption of the data. The key used for encryption and decryption is called the private key and only people who are authorized for the encryption/decryption.