Cryptography and Network Security by Bhushan Trivedi & Savita Gandhi & Dhiren Pandit

Cryptography and Network Security by Bhushan Trivedi & Savita Gandhi & Dhiren Pandit

Author:Bhushan Trivedi & Savita Gandhi & Dhiren Pandit [Trivedi, Bhushan & Gandhi, Savita & Pandit, Dhiren]
Language: eng
Format: epub
ISBN: 9789389328660
Publisher: BPB Publications
Published: 2022-10-15T00:00:00+00:00


12.3 How it works

The idea of asymmetric key encryption is quite simple. We assume two keys, PrKey and a PuKey, for each user. The users communicate with each other by encrypting anything by the receiver’s public key. The receiver, on receipt, decrypts it by his own private key.

Sounds simple, isn’t it? However, simple it looks like, it is not in the actual sense. The public and private keys are related to each other, without which the preceding conditions cannot be satisfied. The problem is how to stop an attacker with one key (the public key) to learn about the other key (the private key). We will soon see how that is possible to be achieved. We have already hinted about them in chapter 8. In short, the answer is that the algorithms are designed in such a way that generating the key pair is possible using a single operation but learning about the other key from one key demand multiple operations that are infeasible to be carried out in real-time.

The private key (PrKey) is kept with the user and disclosed to nobody. The other key (the PuKey) is purposefully disclosed to everybody who wants to have communication with the user.

If you diligently look at this solution, you can see that this system solves some of the problems that we have mentioned earlier in the section, The need for public-key systems. When anybody’s public key is available (over some form of the directory) to anybody, including a stranger can send anything to that person by encrypting using the receiver’s public key. This guarantees that only the intended receiver, who is in possession of his own private key, can open it and nobody else. The receiver does not need to keep multiple keys, only his public key knowledge is enough for many senders to communicate to him.

Also, the encrypting key, the public key, is public knowledge and there is no harm if it is known even to the attacker. So, sharing a public key does not compromise security. The most important part is that there is no need to share the private key with anybody!



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.