Tuesday, October 19, 2021

Application of Public Key Cryptography

 

Introduction

Different keys are used for encryption and decryption, it is called asymmetric key cryptography. Public key used for encryption, private key used for decryption and vice versa. It is also known as public key cryptography.

 

Application of public key Cryptography

Encryption/Decryption: During this process the sender encrypts the message with the receiver’s public key.

Digital Signature: During this process the sender “signs” a message with his private key.

Key exchange: Both sender & receiver cooperate to exchange a session key, typically for conventional encryption.

 

How to achieve Confidentiality using public key cryptography?

Figure: Confidentilaity

How to achieve Authentication using public key cryptography?

Figure: Authentication

How to achieve Confidentiality & Authentication using public key cryptography?

Figure: Confidentilaity & Authentication


To learn more about Application of Public Key Cryptography, Click here

        Watch more videos click here.

No comments:

Post a Comment