Module 4
Module 4
Module 4
Asymmetric key algorithms, also known as public-key algorithms, are cryptographic algorithms
that use a pair of keys for encryption and decryption: a public key and a private key. asymmetric
key algorithms are typically slower and require more computational resources than symmetric key
algorithms.
1. Key Generation: Each user generates a key pair consisting of a public key and a private
key. The public key is shared openly, while the private key is kept secret.
2. Encryption: To send a message to someone, the sender uses the recipient's public key to
encrypt the message. Once encrypted, only the recipient, who possesses the
corresponding private key, can decrypt the message.
3. Decryption: The recipient uses their private key to decrypt the ciphertext and recover the
original plaintext.
Advantages:
• Key Distribution: As the public key can be freely distributed, there's no need for a
secure channel to exchange keys.
• Authentication: Asymmetric algorithms can be used for digital signatures, allowing a
sender to sign a message with their private key, and others to verify the signature using
the sender's public key.
• Non-Repudiation: Since only the sender possesses the private key, they can't deny
having sent a message that's been signed with their private key.
Both are used for secure data transmission and digital signature
• y
RSA algorithm is an asymmetric cryptography algorithm. Asymmetric actually means that it
works on two different keys i.e. Public Key and Private Key. As the name describes that the
Public Key is given to everyone and the Private key is kept private.
The idea of RSA is based on the fact that it is difficult to factorize a large integer. The public
key consists of two numbers where one number is a multiplication of two large prime numbers.
And private key is also derived from the same two prime numbers. So if somebody can factorize
the large number, the private key is compromised. Therefore encryption strength totally lies
on the key size and if we double or triple the key size, the strength of encryption increases .
1. Authenticity: The identity of the signer is verified.
2. Integration: Since the content was digitally signed, it hasn’t been altered or
interfered with.
3. Non-repudiation: demonstrates the source of the signed content to all parties.
The act of a signer denying any affiliation with the signed material is known as
repudiation.
#Hash_function