Computer Science, asked by QweenRani9152, 1 year ago

What are the requarements of public key crytography?

Answers

Answered by steny1
0
A look at the encryption algorithm and its security benefits
Public-key cryptography, or asymmetric cryptography, is an encryption scheme that uses two mathematically related, but not identical, keys - a public key and a private key. Unlike symmetric key algorithms that rely on one key to both encrypt and decrypt,each key performs a unique function. The public key is used to encrypt and the privatekey is used to decrypt.It is computationally infeasible to compute the private key based on the public key. Because of this, public keys can be freely shared, allowing users an easy and convenient method for encrypting content and verifying digital signatures, and private keys can be kept secret, ensuring only the owners of the private keys can decrypt content and create digital signatures.Since public keys need to be shared but are too big to be easily remembered, they are stored on digital certificates for secure transport and sharing. Since private keys are not shared, they are simply stored in thesoftware or operating system you use, or onhardware (e.g., USB token, hardware security module) containing drivers that allow it to be used with your software or operating system.
Answered by Anonymous
3
Computationally easy for a party B to generate
a pair (public key KUb, private key KRb)
2. Easy for sender to generate ciphertext:
3. Easy for the receiver to decrypt ciphertect
using private key:
C E (M ) = KUb
M D (C) D [E (M )

I hope it's help you
Similar questions