Advantages and disadvantages of public key cryptography, Computer Engineering

Assignment Help:

What are the advantages and disadvantages of public key cryptography?

Advantages and Disadvantages:

Improved security and convenience: private keys never require be transmitting or revealing to anyone.
They can give a method for digital signatures

Public-key authentication protects repudiation; all users have sole responsibility for protecting his or her private key. Such property of public-key authentication is frequently termed as non-repudiation.

A drawback of using public-key cryptography for encryption is speed. The best solution for encryption is to merge public and secret-key systems.

The public-key system can be utilized to encrypt a secret key that is used to encrypt the bulk of message or a file. Such a protocol is termed as a digital envelope. A successful attack upon a certification authority will permit an adversary to impersonate whomever the adversary decides to by using a public-key certificate through the compromised authority to bind a key of the adversary's pick to the name of other user. Public-key cryptography is not implies as replace secret-key cryptography, although rather to supplement this, to make this more secure.


Related Discussions:- Advantages and disadvantages of public key cryptography

Explain interface, What is an Interface? An interface is not a class. I...

What is an Interface? An interface is not a class. It is an entity that is explained by the word Interface. An interface has no implementation; it only has the signature or in

What does a socket having of, The combination of an IP address and a port n...

The combination of an IP address and a port number is known as a socket.

Resolution method - artificial intelligence, Resolution Method - Artificial...

Resolution Method - Artificial intelligence: A minor miracle happened in 1965 when Alan Robinson published his resolution function. This function uses a generalized format of t

Explain functions of direct memory access, Q. Explain functions of direct m...

Q. Explain functions of direct memory access? Though CPU intervention in DMA is minimised however it should use path between interfaces that is system bus. So DMA involves an e

Database management system, what is time out based schemes in concurrency c...

what is time out based schemes in concurrency control

Your worksheet and organizing the data, You presently work for an automotiv...

You presently work for an automotive parts supply store. Your company is growing, and is considering expansion. The company presently has three locations (North, South, and Central

Distinguish between ROM, Distinguish between ROM, PROM, EPROM, EEPROM. ...

Distinguish between ROM, PROM, EPROM, EEPROM. Ans: ROM: It also called Read Only Memory is a Permanent Memory. The data is permanently stored and cannot be changed in Perm

Development of information system, Development of information system must b...

Development of information system must be considered as capital investment: The developer of an information system must think about different solutions of a particular problem and

what is lrd_stmt?, The lrd_stmt function associates a character string (ge...

The lrd_stmt function associates a character string (generally a SQL statement) with a cursor. This function sets a SQL statement to be processed.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd