Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
The art of protecting information by transforming it into an unreadable format, called cipher text. Only those who possess a secret key can decipher the message into plain text. Cipher Text can sometimes be broken by cryptanalysis, also called codebreaking, although modern cryptography techniques are virtually unbreakable.
Everyone has secrets; some have more than others. When it becomes necessary to transmit those secrets from one point to another, it's important to protect the information while it's in transit. Cryptography presents various methods for taking legible, readable data, and transforming it into unreadable data for the purpose of secure transmission, and then using a key to transform it back into readable data when it reaches its destination.
ciphertext
Categorization:
Keys: A key is a value that works with a cryptographic algorithm to produce a specific ciphertext. Keys are basically really, really, really big numbers. Key size is measured in bits; the number representing a 1024-bit key is darn huge. In public key cryptography, the bigger the key, the more secure the ciphertext. On this basis Cryptography is classified as :-
Private key!!
or
Conventional key!!
Conventional cryptography, also called secret-key or symmetric-key encryption, one key is used both for encryption and decryption. The Data Encryption Standard (DES) is an example of a conventional cryptosystem that is widely employed by the Federal Government
Public key!!
Anyone can see!!
Public key!!
The problems of key distribution are solved by public key cryptography,the concept of which was introduced by Whitfield Diffie and Martin Hellman in 1975. Public key cryptography is an asymmetric scheme that uses a pair of keys for encryption: a public key, which encrypts data, and a corresponding private, or secret key for decryption. As, You publish your public key to the world while keeping your private key secret. Anyone with a copy of your public key can then encrypt information that only you can read. Even people you have never met.
conventional cryptography was once the only available means for relaying secret information, the expense of secure channels and key distribution relegated its use only to those who could afford it, such as governments and large banks (or small children with secret decoder rings). Public key encryption is the technological revolution that provides strong cryptography to the adult masses.
Public key cryptography is that it allows people who have no preexisting security arrangement to exchange messages securely. The need for communications involve only public keys, and no private key is ever transmitted or shared. Some examples of public-key cryptosystems are RSA ,DiffieHellman and DSA, the Digital Signature Algorithm
Digital signatures
A major benefit of public key cryptography is that it provides a method for employing digital signatures. Digital signatures enable the recipient of information to verify the authenticity of the informations origin, and also verify that the information is intact.
Advantage
High level security..
High Integrity
Exploit
Banking purpose.. Credit Card A.T.M Government agencies Military forces
CONCLUSION
Provides data security.
Reduces the risk of intruders. Avoid risk of getting disrupted data.
ANY QUERIES??