Advantages & disadvantages of public-key cryptography, Computer Engineering

Assignment Help:

Advantages & Disadvantages

Enhanced security and convenience: private keys never require be transmitting or revealing to anyone. 

They can givce a method for digital signatures

 Public-key authentication prevents repudiation; every user has sole responsibility for protecting his or her private key. This property of public-key authentication is often known as non-repudiation. 

A disadvantage of using public-key cryptography for encryption is speed

 For encryption, the best solution is to join public- and secret-key systems.

The public-key system can be used to encrypt a secret key, which is used to encrypt the bulk of a file or message. Like a protocol is known as a digital envelope

 A successful attack on a certification authority will permit an adversary to impersonate whomever the adversary chooses to by using a public-key certificate from the compromised authority to bind a key of the adversary's choice to the name of another user. 

Public-key cryptography is not meant to change secret-key cryptography, but rather to supplement it, to make it more secure.

 


Related Discussions:- Advantages & disadvantages of public-key cryptography

Define the for loop, The for Loop The for loop works well where the num...

The for Loop The for loop works well where the number of iterations of the loop is known before the loop is entered. The head of the loop consists of three parts separated by s

What are the different tones used in strowger telephony, What are the diffe...

What are the different tones used in strowger telephony? Explain with the help of waveforms and the timings. Dial Tone: it is used to indicate that the exchange is ready to r

Describing Random Algorithm, Suppose you''re given n numbers and asked to f...

Suppose you''re given n numbers and asked to find a number that is greater than or equal to the median a) What is the lower bound for the worst case complexity of this problem?

What is a priority interrupt, What is a Priority Interrupt? A priority ...

What is a Priority Interrupt? A priority interrupt is an interrupt that establishes a priority over the various sources to determine which condition is to be serviced first whe

What is orbix?, Orbix is a CORBA ORB (Object Resource Broker) - a commercia...

Orbix is a CORBA ORB (Object Resource Broker) - a commercial software product which helps programmers builds distributed applications. Orbix is an execution of the OMG's (Object Ma

The concept of parallel execution and concurrent , The Concept of Parallel ...

The Concept of Parallel Execution and Concurrent Real world systems are obviously concurrent, and computer science is about modelling the actual world. Examples of actual worl

Which things should microprocessor validate, Q. Which things should micropr...

Q. Which things should microprocessor validate? A microprocessor should validate: Powerful addressing modes More addressing capability More throughput Po

Explain message, Differentiate between message switching, packet switching ...

Differentiate between message switching, packet switching and circuit switching Message switching: Recourse computer sends data to switching office that stores the data in

Differentiate between static and dynamic step loops, Differentiate between ...

Differentiate between static and dynamic step loops. Step loops fall into two classes: Static and Dynamic.  Static step loops have a fixed size that cannot be changed at runti

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd