Introduction to Information Security


Computer Systems Security



Download 1,39 Mb.
bet9/44
Sana01.04.2022
Hajmi1,39 Mb.
#522548
1   ...   5   6   7   8   9   10   11   12   ...   44
Bog'liq
CSS

Computer Systems Security


Public key cryptography

Insufficiencies with Symmetric Encryption

  • Symmetric encryption is not enough to address two key issues
    • key distribution – how to have secure communications in general without having to trust a KDC with your key?
    • digital signatures – how to verify that a received message really comes from the claimed sender?

Advent of Asymmetric Encryption

  • Probably most significant advance in the 3000 year history of cryptography
  • Use two keys: a public key and a private key
  • Asymmetric since parties are not equal
  • Clever application of number theory concepts instead of merely substitution and permutation

How Asymmetric Encryption Works

  • Asymmetric encryption uses two keys that are related to each other
    • a public key, which may be known to anybody, is used to encrypt messages, and verify signatures
    • a private key, known only to the owner, is used to decrypt messages encrypted by the matching public key, and create signatures
    • the key used to encrypt messages or verify signatures cannot decrypt messages or create signatures

Public key Encryption

  • Alice has a key pair: public and private
    • publish the public key such that the key is publicly known
    • Alice keeps the private key secret
  • Other people use Alice’s public key to encrypt messages for Alice
  • Alice uses her private key to decrypt
  • Only Alice can decrypt since only Alice has the private key

Message
rfwekfs
Encrypt
Public key
Message
rfwekfs
Decrypt
Private key
  • Trick: To compute the private key from the public key is a difficult problem.

Asymmetric Encryption for Confidentiality


Bob
Alice

Download 1,39 Mb.

Do'stlaringiz bilan baham:
1   ...   5   6   7   8   9   10   11   12   ...   44




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish