Rohini 38612258376
Rohini 38612258376
1. The same algorithm with the same key is 1. One algorithm is used for encryption
used for encryption and decryption and decryption with a pair of keys, one
for encryption and one for decryption
2. The sender and receiver must share the 2. The sender and receiver must each
algorithm and the key. have one of the matched pair of keys
(not the same one).
1. The key must be kept secret. 1. One of the two keys must be kept
secret.
3. Knowledge of the algorithm plus samples 3. Knowledge of the algorithm plus one
of ciphertext must be insufficient to determine of the keys plus samples of ciphertext
the key. must be insufficient to determine the
other key
Reference :William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006
The intended receiver, in possession of the matching private key, is able to invert the
transformation:
X = D(PRb, Y) An adversary, observing Y and having access to PUb, but not having access to
PRb or X, must attempt to recover X and/or PRb. It is assumed that the adversary does have
knowledge of the encryption (E) and decryption (D) algorithms. If the adversary is interested
only in this particular message, then the focus of effort is to recover X by generating a plaintext
estimate Xˆ . Often, however, the adversary is interested in being able to read future messages as
well, in which case an attempt is made to recover PRb by generating an estimate PRˆ b.
PUBLIC-KEY CRYPTOSYSTEM: AUTHENTICATION
Reference :William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006
the scheme illustrated in the above Figure provides confidentiality to provide authentication:
Y = E(PRa, X) X = D(PUa, Y)
In this case, A prepares a message to B and encrypts it using A’s private key before transmitting
it. B can decrypt the message using A’s public key. Because the message was encrypted using
A’s private key, only A could have prepared the message. Therefore, the entire encrypted
message serves as a digital signature. In addition, it is impossible to alter the message without
access to A’s private key, so the message is authenticated both in terms of source and in terms of
data integrity.
PUBLIC-KEY CRYPTOSYSTEM: AUTHENTICATION AND SECRECY
Reference :William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006
It is, however, possible to provide both the authentication function and confidentiality by a
double use of the public-key scheme :
Z = E(PUb, E(PRa, X)) X = D(PUa, D(PRb, Z))
In this case, we begin as before by encrypting a message, using the sender’s private key.This
provides the digital signature. Next, we encrypt again, using the receiver’s public key.
The final ciphertext can be decrypted only by the intended receiver, who alone has the matching
private key. Thus, confidentiality is provided. The disadvantage of this approach is that the
public-key algorithm, which is complex, must be exercised four times rather than two in each
communication.
APPLICATIONS FOR PUBLIC-KEY CRYPTOSYSTEMS
▪ We can classify the use of public-key cryptosystems into three categories
▪ Encryption /decryption: The sender encrypts a message with the recipient’s public
key.
▪ Digital signature: The sender “signs” a message with its private key. Signing is
achieved by a cryptographic algorithm applied to the message or to a small block
of data that is a function of the message.
▪ Key exchange: Two sides cooperate to exchange a session key. Several different
approaches are possible, involving the private key(s) of one or both parties.
APPLICATIONS FOR PUBLIC-KEY CRYPTOSYSTEMS
▪ Some algorithms are suitable for all three applications, whereas others can be used only
for one or two of these applications.
▪ Table indicates the applications supported by the algorithms.
Reference :William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006
▪ Another form of attack is to find some way to compute the private key given the public
key
▪ There is a form of attack that is peculiar to public-key systems. This is, in essence, a
probable-message attack