Friday, March 22, 2019

encryption :: essays research papers

Traditional cryptography is based on the vector and receiver of a message knowing and using the same surreptitious draw the sender uses the individual(a) learn to encrypt the message, and the receiver uses the same secret pigment to decrypt the message. This method is known as secret- trace fruit cryptography. The chief(prenominal) problem is getting the sender and receiver to agree on the secret key without anyone else finding out. If they are in separate physical locations, they must rely a courier, or a phone system, or close to other transmission system to not disclose the secret key being communicated. Anyone who overhears or intercepts the key in transit piece of ass subsequently read exclusively messages encrypted using that key. The generation, transmission and storage of keys is called key care all cryptosystems must deal with key management issues. Secret-key cryptography frequently has difficulty providing secure key management.Public-key cryptography was invented in 1976 by Whitfield Diffie and Martin Hellman in order to solve the key management problem. In the new system, apiece person gets a pair of keys, called the cosmos key and the cloistered key. distributively persons public key is published while the private key is kept secret. The need for sender and receiver to share secret information is eliminated all communications involve only public keys, and no private key is ever transmitted or shared. No longer is it necessary to trust some communications channel to be secure against eavesdropping or betrayal. Anyone can send a confidential message just using public information, but it can only be decrypted with a private key that is in the sole possession of the intended recipient. Furthermore, public-key cryptography can be used for authentication (digital signatures) as well as for privacy (encryption). Heres how it whole works for encryption when Alice wishes to send a message to phellem, she looks up Bobs public key in a directory, uses it to encrypt the message and sends it off. Bob then uses his private key to decrypt the message and read it. No one earreach in can decrypt the message. Anyone can send an encrypted message to Bob but only Bob can read it. Clearly, one requisite is that no one can figure out the private key from the corresponding public key.Heres how it works for authentication Alice, to sign a message, does a computation involving both her private key and the message itself the output is called the digital signature and is attached to the message, which is then sent.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.