0% found this document useful (0 votes)
38 views1 page

Question No.1 What Are The Principal Elements of A Public-Key Cryptosystem?

The document discusses the principal elements of a public-key cryptosystem, which are: 1) an algorithm for generating asymmetric key pairs (private and public keys), 2) an algorithm for encrypting/signing messages with the private key or decrypting/authenticating messages with the public key, 3) a means to authenticate that a public key belongs to the entity it claims to belong to. It also describes the roles of the public and private keys, where the private key is kept secret by its user while the public key is shared, and they can be used to encrypt signatures/messages for verification or decryption by the other key.

Uploaded by

sameer khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views1 page

Question No.1 What Are The Principal Elements of A Public-Key Cryptosystem?

The document discusses the principal elements of a public-key cryptosystem, which are: 1) an algorithm for generating asymmetric key pairs (private and public keys), 2) an algorithm for encrypting/signing messages with the private key or decrypting/authenticating messages with the public key, 3) a means to authenticate that a public key belongs to the entity it claims to belong to. It also describes the roles of the public and private keys, where the private key is kept secret by its user while the public key is shared, and they can be used to encrypt signatures/messages for verification or decryption by the other key.

Uploaded by

sameer khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Question No.

What are the principal elements of a public-key cryptosystem?

A "public key cryptosystem" would be one using an asymmetric encryption algorithm. It is


related to Public Key Infrastructure (PKI) and sometimes confused with it. The principal
elements could be categorized as:
1) The algorithm for generating the asymmetric key pairs (private key and public key)
2) The algorithm to encrypt a message using the private key or to "sign" the message
3) The algorithm to decrypt a message using the public key or to authenticate it from the digital
signature
4) a means to authenticate that the public key belongs to the entity it purports to belong to -
sometimes omitted in "public-key cryptography".

Question No.2

What are the roles of the public and private key?

A user's private key is kept private and known only to the user. The user's public key is made
available to others to use. The private key can be used to encrypt a signature that can be verified
by anyone with the public key. Or the public key can be used to encrypt information that can
only be decrypted by the possessor of the private key.

You might also like