27 Sep 2022

209

Public Key Cryptography

Format: APA

Academic level: College

Paper type: Assignment

Words: 575

Pages: 2

Downloads: 0

Also known as asymmetric cryptography, public key cryptography is a scheme of encryption which uses a private key and public key which are not identical but are related mathematically. In contrast with the private key cryptography which depends on a single key to both decrypt and encrypts, each key has a unique role. The private key is used for decryption while the public key is used for encryption (Preneel, Paar & Pelzl, 2009). Public key cryptography is computationally infeasible with an aim of computing private key depending on the public key. The public key can, therefore, be shared freely to allow users to have a convenient and easy way for verification of digital signatures and encryption of content (Preneel, Paar & Pelzl, 2009). Private keys are secretly kept to ensure that only the owners can make digital signatures and decrypt the content. Because of the need to share public keys but are sometimes too big to be remembered, they are in most cases kept on digital certificates so that they can be shared and transported securely (Preneel, Paar & Pelzl, 2009). Because private keys are normally kept and not shared, they are safely stored in the operating system, hardware or software with drivers which enable it to be used with the operating system or software. 

The public key is important for several reasons. First, it provides increased security for data. Public key cryptography is the more secure compared to the private key cryptography since its users do not need to reveal or transmit about the private key to people. This way, it reduces the chances of cybercriminals getting the secret key of an individual during transmissions. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Another important benefit of the public key cryptography is the fact that it provides signatures that users cannot repudiate. For public cryptography, the users are required to protect the private key while the private key cryptography requires that the users share the secret keys and even sharing it with third parties. 

With this kind of encryption, the sender can register claims of compromising the secret shared key by one of the users in the process. It is important to note that the public key cryptography is not meant to replace the private key cryptography. Instead, it is supposed to be used to supplement the private key cryptography. In some cases, the users may find the private key encryption not idea and thus they may resort to using the public key cryptography. This is usually done in cases where there are many users. 

Ideally, public key encryption is the choice which allows for many user environments and for that reason it is often necessary to ensure that there is confidentiality through the distribution of key and the signatures for verification of the user identities. Public key cryptology circumvents the risks and logistics which are often gotten through key swapping (Preneel, Paar & Pelzl, 2009). Because of its heightened security and scalability, public key cryptography is widely used and popular in an enterprise environment. Even with these benefits, there are a few challenges connected with public key encryption. First, there is the issue of speed. Compared with the private key encryption, the private key encryption is faster than the public system (Preneel, Paar & Pelzl, 2009). To overcome this challenge, the user needs to combine the speed of the private key system with the public key encryption. Another challenge with the public key encryption is its susceptibility to attacks through authorities with compromised certification. The business application of public key encryption includes digital signatures and encryption. As already mentioned, digital content is signed using a private key and then the verification is done using the public key system. Encryption is done using the public key system and then the content can be decrypted using the private key of the user. 

Reference 

Preneel, B., Paar, C., & Pelzl, J. (2009). Understanding cryptography: a textbook for students and practitioners.  J. Pelzl.–Springer

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Public Key Cryptography.
https://studybounty.com/public-key-cryptography-assignment

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 88

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 87

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration