Advantages & disadvantages of public-key cryptography, Computer Engineering

Assignment Help:

Advantages & Disadvantages

Enhanced security and convenience: private keys never require be transmitting or revealing to anyone. 

They can givce a method for digital signatures

 Public-key authentication prevents repudiation; every user has sole responsibility for protecting his or her private key. This property of public-key authentication is often known as non-repudiation. 

A disadvantage of using public-key cryptography for encryption is speed

 For encryption, the best solution is to join public- and secret-key systems.

The public-key system can be used to encrypt a secret key, which is used to encrypt the bulk of a file or message. Like a protocol is known as a digital envelope

 A successful attack on a certification authority will permit an adversary to impersonate whomever the adversary chooses to by using a public-key certificate from the compromised authority to bind a key of the adversary's choice to the name of another user. 

Public-key cryptography is not meant to change secret-key cryptography, but rather to supplement it, to make it more secure.

 


Related Discussions:- Advantages & disadvantages of public-key cryptography

Describe arp message format in brief, Describe ARP message format in brief....

Describe ARP message format in brief.                             0                                        8                                      16

Relation ship, what is relationship among objects in software engineering??...

what is relationship among objects in software engineering??

What are attributes, What are Attributes?  Attributes are declarative ...

What are Attributes?  Attributes are declarative tags in code that insert additional metadata into an assembly. There exist two types of attributes in the .NET Framework: Pred

One of the fault base testing techniques, One of the fault base testing tec...

One of the fault base testing techniques is:- Mutation testing is the fault base testing.

Describe the external users of system, Q. Describe the External Users of sy...

Q. Describe the External Users of system? External Users: Modern information systems are now reaching beyond the boundaries of traditional business to involve customers and o

Computer networking, what are the steps to implement bus topology?

what are the steps to implement bus topology?

What do you mean by drive cache, Q. What do you mean by Drive Cache? Di...

Q. What do you mean by Drive Cache? Disk cache may be a part of RAM sometimes known as soft disk cache which is used to speed up access time on a disk. In latest technologies s

What is the use of buffer register, What is the use of buffer register? ...

What is the use of buffer register? The buffer register is used to avoid speed mismatch among the I/O device and the processor.

Define linear probing with respect to hashing technique, Define Linear Pro...

Define Linear Probing Linear Probing:  The easiest way to resolve a collision is to begin with the hash address and do a sequential search by the table for an empty location.

What is dynamic random access memory, Q. What is Dynamic Random Access Memo...

Q. What is Dynamic Random Access Memory? RAM technology is divided into 2 technologies: Static and dynamic. A dynamic RAM (DRAM) is made with cells which store data as charge o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd