Aptitude Engineering Mathematics Discrete Mathematics Operating System DBMS Computer Networks
Public Key Encryption
Last Updated : 24 Jun, 2024
What is Public Key Cryptography?
Public key cryptography is a method of secure communication that uses a
pair of keys, a public key, which anyone can use to encrypt messages or
verify signatures, and a private key, which is kept secret and used to decrypt
messages or sign documents. This system ensures that only the intended
recipient can read an encrypted message and that a signed message truly
comes from the claimed sender. Public key cryptography is essential for
secure internet communications, allowing for confidential messaging,
authentication of identities, and verification of data integrity.
What is a Cryptographic Key?
A cryptographic key is a piece of information used by cryptographic
algorithms to encrypt or decrypt data, authenticate identities, or generate
digital signatures. It serves as a parameter to control cryptographic
operations, ensuring the security and privacy of digital communications and
transactions.
Encryption
The process of changing the plaintext into the ciphertext is referred to as
encryption.
The encryption process consists of an algorithm and a key. The key is a
value independent of the plaintext.
The security of conventional encryption depends on the major two
factors
1. The Encryption algorithm
2. Secrecy of the key
Once the ciphertext is produced, it may be transmitted. The Encryption
algorithm will produce a different output depending on the specific key
being used at the time. Changing the key changes the output of the
algorithm.
Once the ciphertext is produced, it may be transmitted. Upon reception, the
ciphertext can be transformed back to the original plaintext by using a
decryption algorithm and the same key that was used for encryption.
Decryption
The process of changing the ciphertext to the plaintext that process is
known as decryption.
Public Key Encryption : Asymmetric is a form of Cryptosystem in which
encryption and decryption are performed using different keys-Public key
(known to everyone) and Private key (Secret key). This is known as Public
Key Encryption.
Characteristics of Public Encryption key
Public key Encryption is important because it is infeasible to determine
the decryption key given only the knowledge of the cryptographic
algorithm and encryption key.
Either of the two keys (Public and Private key) can be used for encryption
with other key used for decryption.
Due to Public key cryptosystem, public keys can be freely shared,
allowing users an easy and convenient method for encrypting content
and verifying digital signatures, and private keys can be kept secret,
ensuring only the owners of the private keys can decrypt content and
create digital signatures.
The most widely used public-key cryptosystem is RSA (Rivest–Shamir–
Adleman). The difficulty of finding the prime factors of a composite
number is the backbone of RSA.
Example:
Public keys of every user are present in the Public key Register. If B wants
to send a confidential message to C, then B encrypt the message using C
Public key. When C receives the message from B then C can decrypt it using
its own Private key. No other recipient other than C can decrypt the
message because only C know C’s private key.
Public Key Encryption
Components of Public Key Encryption
Plain Text: This is the message which is readable or understandable.
This message is given to the Encryption algorithm as an input.
Cipher Text: The cipher text is produced as an output of Encryption
algorithm. We cannot simply understand this message.
Encryption Algorithm: The encryption algorithm is used to convert plain
text into cipher text.
Decryption Algorithm: It accepts the cipher text as input and the
matching key (Private Key or Public key) and produces the original plain
text
Public and Private Key: One key either Private key (Secret key) or Public
Key (known to everyone) is used for encryption and other is used for
decryption
Applications of the Public Key Encryption
Encryption/Decryption: Confidentiality can be achieved using Public Key
Encryption. In this the Plain text is encrypted using receiver public key.
This will ensure that no one other than receiver private key can decrypt
the cipher text.
Digital signature: Digital signature is for senders authentication
purpose. In this sender encrypt the plain text using his own private key.
This step will make sure the authentication of the sender because
receiver can decrypt the cipher text using senders public key only.
Key exchange: This algorithm can use in both Key-management and
securely transmission of data.