answersLogoWhite

0


Best Answer

A "public key cryptosystem" would be one using an asymmetric encryption algorithm. It is related to Public Key Infrastructure (PKI) and sometimes confused with it. The principal elements could be categorized as:

1) the algorithm for generating the asymmetric key pairs (private key and public key)

2) the algorithm to encrypt a message using the private key or to "sign" the message

3) the algorithm to decrypt a message using the public key or to authenticate it from the digital signature

4) a means to publish the public key

5) a means to authenticate that the public key actually belongs to the entity it purports to belong to - sometimes omitted in "public-key cryptography". PKI provides a means to achieve this.

There are many different public key encryption algorithms. Some of the more popular ones are: SSL (Secure Socket Layer), TLS (Transport Layer Security), PGP (Pretty Good Privacy), and GPG (Gnu Privacy Guard). A mathematical algorithm is used to generate a private key which is held by the owner while the public key is provided to everyone that the owner wants to communicate with. The owner of the private key uses it to encrypt the message. Someone receiving it can only decrypt it by using the author's public key. This provides some authentication of the source of the message - if the recipient is confident that the public key they are using really belongs to the purported author. A user's public key can also be used to encrypt a message so that only the holder of the corresponding private key will be able to decrypt it. This provides confidentiality for the sent message. Two people can achieve secure communications by using each others public keys to encrypt messages so that only the recipient can read each message.

Asymmetric encryption algorithms can also be used to digitally sign messages. In this case a message digest is created and then encrypted using the private key. The recipient can duplicate the message digest, then decrypt the digital signature using the originators public key and compare the two digests. If the message has been tampered with, then the digests will not match.

Authentication of the public keys, i.e. being certain who a public key really belongs to, can be achieved in different ways:

  1. a web of trust - you get public keys from people or entities you personally know and trust and build up a "key ring" of those keys. If someone whom you have a public key from sends you a public key for another entity, you can decide whether or not you trust them enough to add the new key to your key ring. You have to install each certificate manually in order to be able to use it with the other person.
  2. PKI - in this scenario, you have a Certificate Authority (CA) that vouches for the ownership of a public key. PKI permits each certificate to be signed only by a single party: a certificate authority (CA). The CA's certificate may itself be signed by a different CA, all the way up to a 'self-signed' root certificate. These root certificates are maintained by a "Registration Authority" (RA). Root certificates must be available to those who use a lower level CA certificate and so are typically distributed widely. They are for instance, distributed with such applications as browsers and email clients. In this way SSL/TLS-protected Web pages, email messages, etc. can be authenticated without requiring users to manually install root certificates. Applications commonly include over one hundred root certificates from dozens of PKIs, thus by default bestowing trust throughout the hierarchy of certificates which lead back to them. An important additional feature is needed for this approach. You must also have a mechanism for revoking expired or compromised certificates and getting that information out to users.
  3. A third alternative is Simple Public Key Infrastructure (SPKI). SPKI does not associate users with persons, since the key is what is trusted, rather than the person. SPKI does not use any notion of trust, as the verifier is also the issuer. This is called an "authorization loop" in SPKI terminology, where authorization is integral to its design. In this case, the entity originating a connection with a subsidiary node sends a message including the key it plans to use for communication with the subsidiary node. Each entity is identified by its public key.
User Avatar

Wiki User

12y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

9y ago

Public key cryptography is also called asymmetric cryptography. In this cryptography technique there are two parts of key . These two parts are a) secret key and b) public key.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are the principal elements of a public key cryptosystem?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Examples of public key cryptography?

Public Key Cryptography is a method of secure communication. It involves the creation of both a public and a private key. When sending a message, the sender encrypts the message with the recipients public key. After receiving the message, the recipient may then decode the message with his/her associated private key. One area that public key cryptography is used in is SSL / TLS (Secure Socket Layer). An example of an SSL library is the CyaSSL Embedded SSL Library. CyaSSL provides several public key cryptography options, including RSA, DSS, DH, and NTRU. In addition to SSL, Public Key Cryptography is used in a large variety of techniques, algorithms, and protocols including: Diffie-Hellman key exchange protocol RSA Encryption Algorithm Cramer-Shoup cryptosystem NTRUEncrypt cryptosystem GPG, OpenPGP Internet Key Exchange PGP


What are the key elements of a healthy and livable city?

Key elements of a healthy and livable city:Excellent urban infrastructureSeamless public transportationGood urban governanceExcellent public servicesWithin tolerable limits of environmental pollution


What are the principal elements of a public-key cryptosystem?

A "public key cryptosystem" would be one using an asymmetric encryption algorithm. It is related to Public Key Infrastructure (PKI) and sometimes confused with it. The principal elements could be categorized as:1) the algorithm for generating the asymmetric key pairs (private key and public key)2) the algorithm to encrypt a message using the private key or to "sign" the message3) the algorithm to decrypt a message using the public key or to authenticate it from the digital signature4) a means to publish the public key5) a means to authenticate that the public key actually belongs to the entity it purports to belong to - sometimes omitted in "public-key cryptography". PKI provides a means to achieve this.There are many different public key encryption algorithms. Some of the more popular ones are: SSL (Secure Socket Layer), TLS (Transport Layer Security), PGP (Pretty Good Privacy), and GPG (Gnu Privacy Guard). A mathematical algorithm is used to generate a private key which is held by the owner while the public key is provided to everyone that the owner wants to communicate with. The owner of the private key uses it to encrypt the message. Someone receiving it can only decrypt it by using the author's public key. This provides some authentication of the source of the message - if the recipient is confident that the public key they are using really belongs to the purported author. A user's public key can also be used to encrypt a message so that only the holder of the corresponding private key will be able to decrypt it. This provides confidentiality for the sent message. Two people can achieve secure communications by using each others public keys to encrypt messages so that only the recipient can read each message.Asymmetric encryption algorithms can also be used to digitally sign messages. In this case a message digest is created and then encrypted using the private key. The recipient can duplicate the message digest, then decrypt the digital signature using the originators public key and compare the two digests. If the message has been tampered with, then the digests will not match.Authentication of the public keys, i.e. being certain who a public key really belongs to, can be achieved in different ways:a web of trust - you get public keys from people or entities you personally know and trust and build up a "key ring" of those keys. If someone whom you have a public key from sends you a public key for another entity, you can decide whether or not you trust them enough to add the new key to your key ring. You have to install each certificate manually in order to be able to use it with the other person.PKI - in this scenario, you have a Certificate Authority (CA) that vouches for the ownership of a public key. PKI permits each certificate to be signed only by a single party: a certificate authority (CA). The CA's certificate may itself be signed by a different CA, all the way up to a 'self-signed' root certificate. These root certificates are maintained by a "Registration Authority" (RA). Root certificates must be available to those who use a lower level CA certificate and so are typically distributed widely. They are for instance, distributed with such applications as browsers and email clients. In this way SSL/TLS-protected Web pages, email messages, etc. can be authenticated without requiring users to manually install root certificates. Applications commonly include over one hundred root certificates from dozens of PKIs, thus by default bestowing trust throughout the hierarchy of certificates which lead back to them. An important additional feature is needed for this approach. You must also have a mechanism for revoking expired or compromised certificates and getting that information out to users.A third alternative is Simple Public Key Infrastructure (SPKI). SPKI does not associate users with persons, since the key is what is trusted, rather than the person. SPKI does not use any notion of trust, as the verifier is also the issuer. This is called an "authorization loop" in SPKI terminology, where authorization is integral to its design. In this case, the entity originating a connection with a subsidiary node sends a message including the key it plans to use for communication with the subsidiary node. Each entity is identified by its public key.


What is a characteristic of public key cryptography?

If data is encrypted with the public key, only the private key can decrypt itAnswer Explanation: Public key encryption uses an asymmetric algorithm, which uses a public key and private key combination for the encryption and decryption process. If data is encrypted with the public key, only the private key can decrypt the data. The public key cannot decrypt a message that was encrypted with the public key. Alternatively, if data is encrypted with the private key, only the public key can decrypt the data.


Private key encryption safer than public key?

No, Public key cryptography is safer than Private key Cryptography. In public key cryptography only only one part of key is visible to others.


What is the key sentence?

The main clause or the principal clause in a complex sentence; is a key sentence.


What is the aim of public transportation?

Commuter safety and efficiency in pollution reduction are key elements of public transportation. Currently, there is a worldwide push for solar-powered vehicles to help reduce "carbon imprint'.


What are the examples of public and private key?

example for the private and public key


How do you you win riddle school 3?

get the key to the exist, the key is in the Principal's office as always


What are characteristics of public key cryptography?

If data is encrypted with public key, only private key can decrypt it. AGN


What are Blau and scott's key elements of modern organisation management theory?

the owners or managers of the organization, the members of rank and file, the clients and the public (members of society)


What are the key elements of social mobilization?

Some key elements of social mobilization are to Inspire the people and maintain integrity.