Introduction
Different
keys are used for encryption and decryption, it is called asymmetric key
cryptography. Public key used for encryption, private key used for decryption
and vice versa. It is also known as public key cryptography.
Application of public key Cryptography
Encryption/Decryption: During
this process the sender encrypts the message with the receiver’s public key.
Digital
Signature: During this process the sender “signs” a message with his
private key.
Key
exchange: Both sender & receiver cooperate to exchange a session
key, typically for conventional encryption.
How to achieve Confidentiality using public key cryptography?
Figure: Confidentilaity |
How to achieve Authentication using public key cryptography?
Figure: Authentication |
How to achieve Confidentiality & Authentication using public key cryptography?
Figure: Confidentilaity & Authentication |
To learn more about Application of Public Key Cryptography, Click here
No comments:
Post a Comment