State and explain the principles of public key cryptography.

Subject Computer and Network Security
NU Year Set: 2.(b) Marks: 5 Year: 2017

Also called asymmetric cryptography 

1. Different from secret key cryptography, algorithms for encoding and decoding differ considerably •

2.Working with two keys

→ A private key d (known only to the owner)

→ A public key e (known by possibly everyone)

3. Public key cryptography principle 

4. More easily configurable than secret key cryptography, but slower

5. Often combined with secret key: authentication and distribution of a secret key (e.g. Diffie-Hellman for establishment of a shared secret)

Login to post your comment.