__Application, Requirement and Cryptanalysis of
Public Key Cryptography__

• Application
of public key cryptosystem are classified into three categories:

1. Encryption/Decryption: During this process the
sender encrypts the message with the receiver’s public key.

2. Digital Signature: During this process the sender
“signs” a message with his private key.

3. Key exchange: Both sender & receiver cooperate
to exchange a session key, typically for conventional encryption.

• The PKC
algorithm must fulfill the following conditions:

1.
It is
computationally easy for party B to generate the key pair (PU_{b }and
PR_{b})

2. It is **computationally
easy for a sender A**, knowing the public key and the message to be
encrypted, M, to generate the corresponding ciphertext. *C = E (PU _{b}, M)*

3. It is **computationally
easy for the receiver B **to decrypt the resulting ciphertext using private
key to recover the original message. *M
= D (PR _{b}, C) = D (PR_{b}, E (PU_{b}, M))*

4. It is **computationally
infeasible for an attacker**, to determine private key from known public key.

5. It is **computationally
infeasible for an attacker**, to recover original message from known public
key and cipher text.

• Cryptanalysis
of public key cryptosystem are as below:

1. Public
key encryption method is accessible to the brute force attack.

2. Public
key method depends on the use of mathematic equation or some function.

3. ** Key size
is larger **enough to avoid brute force attack.

4. When key
size is large then ** speed of encryption/decryption are too slow**.
This key is generating for to make brute force attack impractical.

5. Public
key encryption is bound to ** signature application and management**.

6. If
attacker have public key of receiver and he/she try to calculate private key,
but it is not confirmed that this type of attack is feasible for a particular
public key algorithm.

** To learn more about Application of Public Key Cryptography, Requirement and Cryptanalysis of public key cryptography watch below video**

**Video : Application of Public Key Cryptography**

**Video : Requirement and Cryptanalysis of Public Key Cryptography**

**Watch more videos click here.**

## No comments:

## Post a Comment