StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Public-key cryptography and information security - Essay Example

Cite this document
Summary
Public Key Cryptography (PKC) uses a key with two elements, a "public key" and a "private key", for the implementation of an encryption algorithm that doesn't require two parties (sender and receiver) to first exchange a secret key in an attempt to carry out the process of communication…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
Public-key cryptography and information security
Read Text Preview

Extract of sample "Public-key cryptography and information security"

PUBLIC-KEY CRYPTOGRAPHY AND INFORMATION SECURITY Public-Key cryptography and Information Security Affiliation Public Key Cryptography (PKC) uses a key with two elements, a "public key" and a "private key", for the implementation of an encryption algorithm that doesn't require two parties (sender and receiver) to first exchange a secret key in an attempt to carry out the process of communication. In this scenario, the public key part is used for encryption entirely at the receiver side, whose private key part is applied for decryption.

However, in order to make this communication safe it is necessary to make sure that only the intended receiver is able to access the private part of the key. Moreover, this concept is also used in elegant implementation of digital signatures (Tschabitscher, 2011) and (Adleman, Rivest, Shamir, & Williamson, 2010). Public key cryptography is considered as extremely protected for the reason that it does not require a secret common key between the receiver and sender. However, other encryption methods and technologies that utilize a single common key to both decrypt and encrypt information depend mutually on both parties (sender and receiver) in order to make a decision about a key ahead of time exclusive of other parties finding what that key is (Kayne, 2011).

The most important benefit of PKC is its excellent security and ease of use. In addition, PKC is very useful in implementing secure algorithms since there is need to have an identical key for both parties (sender and the receiver). In this scenario, the data or information are kept private using a key, thus no one is able to access it and it will be encrypted with same public key at the receiver side. One more significant advantage of PKC is that, as compared to symmetric algorithms, public-key encryption structures are able to produce not only privacy but also verification and integrity (BlogPost, 2009), (Basu, 2010) and (Sotomayor, 2005).

The major issue or disadvantage of making use of public-key system is that they are not as speedy as symmetric algorithms data encryption. Additionally, the public key algorithms are very useful for data encryption however this, consequently, adds a calculation cost. Moreover, the amount of computations required in public key algorithms is normally more than the amount of calculations requires for other algorithms (BlogPost, 2009). The management of security using the technology based systems offers 24x7 security management without specific involvement of human beings.

Consequently, it reduces the extensive need for the human resource to effectively manage the process of information security management. On the other hand, in many cases such kind of security can be breached and information hacked for the sake of illegal attentions. Moreover, for this purpose there are a lot of viruses and hacking programs that can breach the security circles programmed for technology based security management (Biometrics, 2011). At the present, information security has become a major concern of almost all the organizations.

Additionally, new trends of information technology are evolving and causing higher needs for the enhanced security management and protection of the business and personal information. In this scenario, the main trend we are able to see from pervious few years is about the data breaches, which is about the increasing use of encryption technologies in an attempt to defend sensitive information. Another new trend that is seen nowadays is about the safety of mainframe environment that sustained development of security threats and augment government regulations and business standards.

Furthermore, hacking has become a profession. All of these factors require extensive business and corporate information security through more effective ways (Gupta, 2008), (Lemon, 2006) and (News Wire Publications, LLC, 2009). References Adleman, L., Rivest, R., Shamir, A., & Williamson, M. (2010). Public Key Cryptography (PKC) History . Retrieved March 15, 2011, from http://www.livinginternet.com/i/is_crypt_pkc_inv.htm Basu, D. (2010, June 19). Public Key Encryption. Retrieved March 15, 2011, from Buzzle.

com: http://www.buzzle.com/articles/public-key-encryption.html Biometrics. (2011, March 07). Using biometric technology to solve security problems. Retrieved March 15, 2011, from http://biometricsforsale.co.cc/using-biometric-technology-to-solve-security-problems/ BlogPost. (2009, February 28). Public Key Cryptography. Retrieved March 14, 2011, from http://publickeycryptography.blogspot.com/2009/02/pros-and-cons-of-public-key-systems.html Gupta, R. (2008, December 24). Top 10 trends in Information Security for 2009.

Retrieved March 15, 2011, from http://www.ciol.com/Security/Feature/Top-10-trends-in-Information-Security-for-2009/241208114170/0/ Kayne, R. (2011). What is Public Key Encryption? Retrieved March 13, 2011, from WiseGeek.com: http://www.wisegeek.com/what-is-public-key-encryption.htm Lemon, S. (2006, October 18). 10 security trends worth watching. Retrieved March 14, 2011, from http://www.networkworld.com/news/2006/101806-hitb-ten-security-trends-worth.html News Wire Publications, LLC. (2009, November 30).

Top 10 information security trends for 2010. Retrieved March 14, 2011, from http://homelandsecuritynewswire.com/top-10-information-security-trends-2010 Sotomayor, B. (2005). Public key cryptography. Retrieved March 15, 2011, from http://gdp.globus.org/gt4-tutorial/multiplehtml/ch09s03.html Tschabitscher, H. (2011). Public Key Cryptography . Retrieved March 15, 2011, from About.com: http://email.about.com/library/glossary/bldef_public_key_crypto.htm

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Public-key cryptography and information security Essay”, n.d.)
Retrieved from https://studentshare.org/information-technology/1411097-public-key-cryptography-and-information-security
(Public-Key Cryptography and Information Security Essay)
https://studentshare.org/information-technology/1411097-public-key-cryptography-and-information-security.
“Public-Key Cryptography and Information Security Essay”, n.d. https://studentshare.org/information-technology/1411097-public-key-cryptography-and-information-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Public-key cryptography and information security

Cryptography and Security Services

However, advancement in electronic communication systems especially the internet has fueled the use of cryptography in sending private messages and information such as medical records, banking data, and credit card numbers among others via electronic channels.... The paper "cryptography and Security Services" is centered on cryptography as a powerful system that is facilitated by the National Security Agency in the US.... hellip; The National security Agency was chartered in 1952 and it plays a major role in coding systems, breaking codes, and creating codes in the government of the US....
12 Pages (3000 words) Case Study

Single sign-on / field of cryptography

ACISP, ACISP 2003, & Australasian Conference on information security and Privacy.... information security and privacy: 8th australasian conference; proceedings.... Introduction to information security Management information security: Principles and Practices.... The term cryptology is often used in the field of cryptography when analyst refer to both the cryptography and cryptanalysis.... cryptography and public key infrastructure on the Internet....
3 Pages (750 words) Research Paper

Modern Cryptographc Protocol in Fixed and Mobile Communication

It can be apparently observed that network security incorporates wide application of cryptographic protocols as well as algorithms in order to ensure secured and safe communication within different technological aspect.... Furthermore, it can be viewed that absence of proper verification mainly lead towards occurring flaws as well as security errors.... It can be affirmed that modern business transportation of information is not possible without mobile as well as fixed communication....
7 Pages (1750 words) Research Paper

Cryptography Secure Socket Layer

security requires constant and periodic changes to pace up and counter the threats that are ever increasing.... One cannot predict that the blowfish encryption algorithm will also be replaced by the new and more secure algorithm known as (Anonymous2007, 500-500) two fish that will also be replaced at some period of this information age.... These types of attacks extracts information associated with the physical deployment of cryptographic algorithm along with the hardware utilized for encrypting or decrypting data....
4 Pages (1000 words) Research Paper

Information Systems and Security

One of the fundamental tools used in the information security is signature.... This paper presents detailed overview of the cryptography and modern methods of cryptography implementation for the better management of information system and its security.... One necessary feature for safe information hiding and communications is the utilization of cryptography and its modern tools and techniques (Kessler).... This research presents a detailed analysis of the "Information Systems and security"....
8 Pages (2000 words) Essay

Public Key Cryptography in Sensor Networks

Not only does public key cryptography solve critical security: Cryptographic communication and authentication distribution.... Further, Alice may execute encryption on her message and send her information to Bob using the public key that is being used by Bob.... Knowing that only Bob, the possessor of Bob's private key, can decrypt information provided.... it is false because cryptography public key utilizes a different key when decrypting and another one during encryption to solve distribution challenges....
4 Pages (1000 words) Assignment

The Suitable Applications for Iris Based Key Generation Method

hellip; The use of biometric in information security systems normally involve encrypting the plain text using the biometric features to come up with the ciphertext.... The method provides a better security system for information.... For example, the public key infrastructure (PKI) method of generation may use the iris biometric features to enhance the security of Private Key and protect the user authentication systems against potential intruders....
6 Pages (1500 words) Assignment

Cryptography as One Fundamental Way of Saving Communications: Information and Data Security Technology

The majority widespread shape of asymmetrical encryption is in the implementation of transmitting data messages where the correspondent encodes as well as the receiving person translates the data and information message through utilizing a random key produced through the public key of the dispatcher.... In this research, I will present a comprehensive overview of the main security and privacy aspects those we need to assess during the implementation of any security policy....
18 Pages (4500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us