Thursday, July 8, 2021

Application of Public Key Cryptography | Requirement and Cryptanalysis of Public Key Cryptography

 

Application, Requirement and Cryptanalysis of Public Key Cryptography

      Application of public key cryptosystem are classified into three categories:

1.    Encryption/Decryption: During this process the sender encrypts the message with the receiver’s public key.

2.    Digital Signature: During this process the sender “signs” a message with his private key.

3.   Key exchange: Both sender & receiver cooperate to exchange a session key, typically for conventional encryption.


      The PKC algorithm must fulfill the following conditions:

1.      It is computationally easy for party B to generate the key pair (PUb and PRb)

2.   It is computationally easy for a sender A, knowing the public key and the message to be encrypted, M, to generate the corresponding ciphertext.   C = E (PUb, M)

3.   It is computationally easy for the receiver B to decrypt the resulting ciphertext using private key to recover the original message.  M = D (PRb, C) = D (PRb, E (PUb, M))

4.   It is computationally infeasible for an attacker, to determine private key from known public key.

5.   It is computationally infeasible for an attacker, to recover original message from known public key and cipher text.

 

      Cryptanalysis of public key cryptosystem are as below:

1.      Public key encryption method is accessible to the brute force attack.

2.      Public key method depends on the use of mathematic equation or some function.

3.      Key size is larger enough to avoid brute force attack.

4.    When key size is large then speed of encryption/decryption are too slow. This key is generating for to make brute force attack impractical.

5.      Public key encryption is bound to signature application and management.

6.      If attacker have public key of receiver and he/she try to calculate private key, but it is not confirmed that this type of attack is feasible for a particular public key algorithm.


    To learn more about Application of Public Key Cryptography, Requirement and Cryptanalysis of public key cryptography watch below video

                                                Video : Application of Public Key Cryptography



Video : Requirement and Cryptanalysis of Public Key Cryptography

Watch more videos click here.


No comments:

Post a Comment