Some assurance of the authenticity of a public key is needed in this scheme to avoid spoofing by adversary as the receiver. Receiver needs to publish an encryption key, referred to as his public key. This is a property which set this scheme different than symmetric encryption scheme.Įach receiver possesses a unique decryption key, generally referred to as his private key. The most important properties of public key encryption scheme are −ĭifferent keys are used for encryption and decryption. The process of encryption and decryption is depicted in the following illustration − This gave rise to the public key cryptosystems. The symmetric key was found to be non-practical due to challenges it faced for key management. With the spread of more unsecure computer networks in last few decades, a genuine need was felt to use cryptography at larger scale. Symmetric cryptography was well suited for organizations such as governments, military, and big financial corporations were involved in the classified communication. Unlike symmetric key cryptography, we do not find historical use of public-key cryptography.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |