1,821
10
Essay, 12 pages (3000 words)

A study on public key cryptography computer science essay

In this research paper, we discussed about the following possible strategies or mechanisms for downloading person ‘ s public key from a node located at a peculiar information science reference.

They are: Looking up the key in the directory via an unauthenticated interaction. Having an attested conversation with the directory. Having the directory sign the information you request. Storing and recovering the certifications from the directory. Having each person responsible for their ain certifications and directing it to the individual they wish to speak. We besides discussed about the strategies or mechanisms in footings of the bandwidth, computational efficiency, security, flexibleness.

Introduction

Public key cryptanalysis is a cryptanalytic procedure which normally uses the asymmetric key algorithms replacing the symmetric key algorithms replacing the symmetric key algorithms.

It is non like the symmetric key algorithm where they require a unafraid initial exchange of one or more secret keys both transmitter and receiver. the asymmetric key algorithm by and large provides a secret private key and publiched public key. By utilizing these keys, they gave protection by genuineness of a message by utilizing the private key to make digital signature which can be proved utilizing the public key. It besides provides the confidentiality and intergrity of the message by utilizing public key encoding which encrypts the message utilizing the public key, but it can be decrypted utilizing merely the private key. By and large the public key cryptanalysis is the a cardinal and widely used engineering around the universe. It involves with many cryptanalytic algorithms and crypto systems. Examples of such cyberspace criterions are transport layer security ( TPS ) , PGP, GPG.

The two chief parts of the public key cryptanalysis are: Public cardinal encoding: the message which is encrypted by the receipient public key can non be decrypted by any other except the person whose holding tha fiting private key. For the interest of confidentiality we used this for. Digital signatures: a signed message with a private key of transmitters can be verified by anyone who has entree of the transmitters public key, which proves the transmitter entree to the private key.

Look UP THE KEY IN A DIRECTORY VIA AN UNAUTHENTICATED INTERACTION

One of the most important cryptanalytic thoughts is the construct of public keys. By and large the system of public keys has two types of keys. They are: Encoding keys. Decryption keys. Practically, dwelling of two types of key will do distribution job worse or non that much better.

However, these keys possess the charming belongingss. They are: A decoding key is provided for every encoding key. Both decoding key and encoding key are non indistinguishable to each other. We can able to calculate brace of keys utilizing the several encoding and decoding keys. It can non possible to calculate the decoding key from the known encoding key. So, hence by utilizing these belongingss, alice and British shilling can pass on in private without holding any secret keys in public key system.

Practically, British shilling generates a brace of keys and by taking convienient means he sends the encoding key to the alice. There is no demand to maintain the encoding key as secret. It has the right to decode the messages merely non to decode it. alice normally uses the encrypt messages and subsequently sends to the British shilling once more. However the message sent by alice can be decrypted by British shilling ( he entirely can make it ) since by utilizing his decrypted key which is maintained in secret. The below shown figure by and large gives the thought of the flow of the information. If bob requires to direct the private messages to the alice, so alice has to make similar brace of keys and has to direct her encoding key to bob. As there is no demand for British shilling to maintain the encoding key as secret, bob can do that public key by puting it in a computing machine web public file.

Once if bob done like this, so any 1 who wants to direct a private message to bob can hold look in to bobs public key and can utilize it to code the message. Since British shilling need non to convey the decrypted key, as nevertheless it can non be computed by utilizing public key the message remains as secure. Merely British shilling can decode it.

Other people can besides code keys in the same computing machine web public file such that it go a directory of public keys. Any two people who have entries in the directory can pass on decently, eventhough they do n’t cognize to each other antecedently. It is indispensable to protect the keys in such a file so that no 1 can alter the others encryption cardinal by puting another encoding key in it. Security: provides good securityFlexibility: non flexibleBandwidth: betterComputational efficiency: carnival

Having AN AUTHENTICATED CONVERSATION TO THE DIRECTORY

The hallmark conversation to the directory can be achieved by utilizing these constructs: First of all, toilet has to bring forth brace of keys in which it consists of one public key and one private key severally.

Here the public key is made to cognize to everyone and a private key which should be maintained in secret. The signatures can be generated by utilizing the private keys. The signature which is created by the Johns private key can non be forged by any one who donot have that key, but anyone can verify that peculiar signature is echt or non by utilizing the public key. So therefore toilet created a brace of keys on his ain computing machine and he besides copy the public key to the peculiar waiter under a certain name. When waiter asks toilet to turn out him, the signature is generated by winscp utilizing johns private key. Subsequently the service verifies the signature as it as johns public key and let toilet to log in. Now whether the waiter is spoofed or hacked, the hacker doesnot cognize your private key/password, they came to cognize merely a signature. But where as the signatures can non be reused so therefore the hackers additions nil by making this.

There is besides one draw back with this, if johns private key is unprotected on his ain computing machine, so any 1 who accessed the computing machine will be able to bring forth the signatures as if like toilet. So therefore they log in to the Johns waiter under his history. Hence merely for this ground, Johns private key has to be encrypted when it is stored on his local machine, utilizing a watchword of Johns pick. Winscp has to decode the key in order to bring forth a signature, so toilet has to type his watchword. This will do password hallmark more convenient so public key hallmark, when every clip toilet logged in to the waiter, he should hold to prefer longer watchword alternatively of the shorter 1s.

Here the lone solution is to utilize an hallmark agent, which holds decrypted private keys and by petitions it generates signatures. By and large, puttys hallmark agent is used by winscp called pagent. whenever the toilet starts the Windowss session, toilet get down pagent and he loads private keys on it. For the remainder of the clip, toilet can get down winscp many times and several signatures are generated utilizing the pageant.

Pageant by and large shutdown whenever the toilet closes windows session, it nevers shops Johns decrypted private key on disc. Security: it provides good security. Flexibility: as it provides good convince, it is flexible in nature. Bandwidth: it provides good bandwidth for the user.

Calculation efficiency: it is efficient. Mentions: N. ferguson ; B. Schneier, practical cryptanalysis, IEEE 1363: standard specifications for public key cryptanalysis.

Having THE DIRECTORY SIGN THE INFORMATION YOU Request

By and large the construct of the digital signatures plays an of import function. It defines as the installed file occupant on the computing machine which verifies who you are. These are used to corroborate your individuality to any other ( 3rd ) party. Digital signatures makes certain that the user which deals with the company has the trusted authorization enrollment or non and besides it should vouch the dealing which is to be done with the parties.

It does confirmation and proof of the user for whom he or she claims to be. This can be done by sing the users paperss supplying makings to the digital certifications. Digital certifications by and large gives the user a piece of head that the message which they have sent has non been by chance altered, insures informations unity. All this procedure will be done cryptographically. Digital certifications can supply confidentiality and security why because the messages can merely be read by the authorized intended receivers. Digital certifications besides checks day of the month and clip by which transmitter or receivers can non reason about the messages which were really sent or received.

The chief constituents of the digital signature are: Public key: this is the portion of the confirmation system and even any one can acquire a transcript of it. Your electronic mail reference and name: this is mandatory to enable the spectator to place the inside informations and these are information intents. Name of the directory: this portion identifies the directory to which this signature relates excessively. Public keys encoding day of the month: this subdivision is used to reset the signature if the mark is abused. Its chief purpose is to put a shelf life.

Digital Idahos consecutive figure: this consecutive Numberss are different Numberss which are wrapped to the signature for excess identifiactiion grounds. Digital signature of the directory: this is the signature of the directories which issues the certifications. In the above shown figure the user a is provided with two keys public and private keys severally. The public key can be known to everyone and besides available for the populace to download, where as the private key is non available to the populace it is maintained in secret.

These keys are used in an encrypted manner to lock the information. To decode the informations the same keys are required. User B can code informations utilizing public key of user ‘ s A. The private key of user A ‘ s is used to decode the message. With the absence of the user A ‘ s private the decoding of informations can non be possible. The below shown figure by and large gives the thought about the encoding and decoding methods severally. Figure BThe users A ‘ s machine informations is converted in to simple twine of the codification after the encoding of the message is been done with his private key.

The obtained consequence is the digital signature. the package of users A ‘ s passes the digital signature to the directory. The complete information which has been hashed has been signed. User B so gets the digitally signed papers which is passed by the user a. the decoding of the signature is been done by the user B ‘ s package afterwards it change back in to a message digest by utilizing user A ‘ s public key. After the procedure of the decoding if it has decrypted the information to the digest degree after that it verifies the user a signed the information or not. to avoid the frauds directories have been introduced.

Users A ‘ s public key can be signed by certification governments, such that to guarantee no 1 else uses this information. It can be possible to verify the digital signature utilizing the directory if the user is unsure of the digital signature. This signature can besides be no longer valid if they are abused. This full procedure is shown below: User A sends a signed papers to the user B. User B first uses the directories public key to verify the signature on users A ‘ s certificationIf the decoding procedure is successful so it proves that it is created by the directory. The user B so takes user B ‘ s public key from the directory and it uses that one to look into the signature of the user A. if there is successful decoding of the user A ‘ s public key user B gives confidence that the signature was created utilizing private key of user A, for which the directory has certified the fiting public keyEfficiency: The signature is much shorter and hence it saves clip. Security: It provides good security.

Flexible: It is inflexible in nature. Bandwidth: Fair.

STORING AND RETRIEVING CERTIFICATES FROM THE DIRECTORY

Bandwidths:

Bandwidth over here is extremely effectual when it comes to hive awaying and recovering certifications from directory. Users can efficaciously utilize the strategies and mechanisms via PKI. Public cardinal certification is besides known as Digital Certificate or Identity certificate.

It represents Certificate Authorities ( CA ) , Registration governments ( RA ) , Digital Certificates, certificate direction service, X500 directories.

COMPUTATION EFFICIENCY:

Certificate Authorities issue certifications. A sure 3rd party can supply Certificate Authority.

Management console implements a direction map. PKI-Public cardinal substructure provides cardinal recovery which is required to retrieve informations or messages when a key is lost. Registration governments are used for enrollment of users and accepting petitions for certifications. User enrollment is used to roll up information and cheque individuality of the users and so register him or her harmonizing to the policy. PKI plays an of import function in calculation efficiency. PKI Functions: PKI maps include: Publishing CertificatesRevoking CertificatesStoring and Retrieving CertificatesCRLs- Certificate Revocation List. Fig 1: Shows the PKI maps, enabled applications and waiters and how to hive away and recover certifications from the directory. Storing and recovering certifications from the directory:

Security:

Repository is a public entree system for hive awaying and recovering certifications.

Data Archives plays a chief function in hive awaying CA files and its records. CA life-time is short but it is of import to verify signatures on the paperss. Data Archives aid to recover files even after a long clip. Naming and Registration besides helps in recovering and hive awaying certifications from the directory. Via directory service with entree of LDAP-Lightweight Directory Access Protocol and other agencies are HTTP, E-Mail, FTTP and X500 compatible directories. Each user must hold one public key in order to implicit the trust policy. Cardinal Recovery waiter plays an of import function in recovering or retrieving the certifications from the directory.

X500 directory waiter is used to hive away and recover CRLS and trusted Certificate Authorities certifications. X500 directory severs uses Directory Access Protocol, Lightweight Directory Access Protocol, whereas Lightweight Directory Access Protocol is supported by IBM HTTP waiter. By enabling the Trust POLICY you can either add or cancel and either shop or recover trusted CAs without reconfiguring. Making certifications and CRLs handily available to authorized users. The storage of certifications and CRLs is a secure, replicated directory service accessible Via LDAP.

Flexibility:

Depository, Data archives, HTTP, electronic mail, X500 directory waiters are really flexible and plays an of import function in procuring, hive awaying and recovering certifications from directory.

HAVING EACH INDIVIDUAL RESPONSIBLE FOR THEIR OWN CERTIFICATES AND SENDING IT TO THE PERSON THEY WISH TO TALK TO

Bandwidths:

Bandwidth between the two terminal users will be extremely efficient and secured.

Each person is responsible for their ain certifications where it includes Digital certification, Certification governments, Registration governments and Deploying a public cardinal substructure. But utilizing no directory each person has to make a shared key between them, with a individual they need to speak to. Shared cardinal must be kept secret.

Here cryptanalysis plays a chief function where it keeps the informations in secret. It includes algorithms to protocols, applications, messages and unafraid systems. The most of import function in cryptanalysis is ENCRYPTION. It is the base for XML encoding and XML signature. Encryption encrypts a message with a digested signifier. Hash map creates a little end product that is alone and it maps for all input messages. Uses are same for both shared key and public cardinal encoding.

COMPUTATION EFFICIENCY:

It is of import to larn about the calculation efficiency of the shared and public key.

Plain text is the message which is wholly clear, non scrambled and disguised. Plain text is unencrypted informations whereas cipher text is an encrypted information. Decryption chief map is to change by reversal the encrypted information of the cypher text and change over it into apparent text. Figure 1.

Shows the encoding and decoding to transform cipher text to a plaintext. Encryption plays a chief function in confidentiality where it transforms cipher text to a field text and is send or shared between peculiar users. It sends the informations to individual where the information is intended to direct. The algorithm for encoding and decoding needs a key with a numerical value which should be particular and a parametric quantity for the algorithm. Incorrect key will non be taken as it is non a right end product. There is a difference between shared key and public key utilizing keys for encoding and decoding, where shared cardinal uses the same key for encoding and decoding, whereas public key uses the different key with particular mathematical values and parametric quantities for encoding and decoding.

Besides the shared key uses the symmetrical manner and public key uses the asymmetrical manner. Public key is used to procure shared cardinal distribution and digital signatures.

EXAMPLE OF EACH INDIVIDUAL RESPONSIBLE FOR THEIR OWN Certificates:

Security:

Let us presume two users ALICE and BOB need to direct a information in secret in between them.

Bob is the terminal user. Alice creates a shared key between him and Alice. This will be known merely to the two users. Therefore Alice can code or decode the shared key so that no 3rd individual will cognize the informations transferred or shared between them. Alice can utilize specific values or parametric quantities to code or decode the information.

The shared or the secured key can be known and found out by the DIFFIE-HELLMAN method. Figure 2. Shows the shared or secured cardinal between Alice and Bob and how they follow the stairss to acquire the value of the secret key ‘ K ‘ .

Flexibility:

DIFFIE-HELLMAN method is really flexible in procuring the key shared between two terminal users. Using the undermentioned schemes/mechanisms each person will be responsible for their ain certifications and directing it to the individual they wish to speak. Making a shared key helps them to code or decode the information and besides public key uses the same regulation as the shared key.

Thank's for Your Vote!
A study on public key cryptography computer science essay. Page 1
A study on public key cryptography computer science essay. Page 2
A study on public key cryptography computer science essay. Page 3
A study on public key cryptography computer science essay. Page 4
A study on public key cryptography computer science essay. Page 5
A study on public key cryptography computer science essay. Page 6
A study on public key cryptography computer science essay. Page 7
A study on public key cryptography computer science essay. Page 8
A study on public key cryptography computer science essay. Page 9

This work, titled "A study on public key cryptography computer science essay" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'A study on public key cryptography computer science essay'. 19 September.

Reference

AssignBuster. (2022, September 19). A study on public key cryptography computer science essay. Retrieved from https://assignbuster.com/a-study-on-public-key-cryptography-computer-science-essay/

References

AssignBuster. 2022. "A study on public key cryptography computer science essay." September 19, 2022. https://assignbuster.com/a-study-on-public-key-cryptography-computer-science-essay/.

1. AssignBuster. "A study on public key cryptography computer science essay." September 19, 2022. https://assignbuster.com/a-study-on-public-key-cryptography-computer-science-essay/.


Bibliography


AssignBuster. "A study on public key cryptography computer science essay." September 19, 2022. https://assignbuster.com/a-study-on-public-key-cryptography-computer-science-essay/.

Work Cited

"A study on public key cryptography computer science essay." AssignBuster, 19 Sept. 2022, assignbuster.com/a-study-on-public-key-cryptography-computer-science-essay/.

Get in Touch

Please, let us know if you have any ideas on improving A study on public key cryptography computer science essay, or our service. We will be happy to hear what you think: [email protected]