2
2
Figure 2.6 illustrates an implementation that satisfies option 4 for end-toend encryption. In the figure, link
encryption is ignored. This can be added, or not, as required. For this scheme, two kinds of keys are identified:
■ Public key cryptography (PKC) is an encryption technique that uses a paired public and private key (or
asymmetric key) algorithm for secure data communication.
■ PKC is also known as public key encryption, asymmetric encryption, asymmetric cryptography, asymmetric
cipher, asymmetric key encryption and Diffie-Hellman encryption.
■ A message sender uses a recipient's public key to encrypt a message. To decrypt the sender's message, only
the recipient's private key may be used.
■ The two types of PKC algorithms are RSA, which is an acronym named after this algorithm's inventors:
Rivets, Shamir and Adelman, and Digital Signature Algorithm (DSA).
■ PKC encryption evolved to meet the growing secure communication demands of multiple sectors and
industries, such as the military.
■ Features:
■ Use two different keys, one for encryption another for decryption
■ The computation of the pair of keys i.e. private key and the public key must be easy.
■ Knowing the encryption algorithm and public key of the intended receiver, computation of cipher text must
be easy.
■ For a receiver of the message, it should be computationally easy to decrypt the obtained cipher text using
his private key.
■ It is also required that any opponent in the network knowing the public key should be unable to determine
its corresponding private key.
■ Having the cipher text and public key an opponent should be unable to determine the original message.
■ The two keys i.e. public and private key can be implemented in both orders D [PU, E (PR, M)] = D [PR, E
(PU, M)]
RSA CRYPTOSYSTEM
ELLIPTIC CURVE CRYPTOGRAPHY.
2.9 Key Exchange Algorithm
Diffie-Hellman key agreement protocol is an exponential key agreement protocol that allows two users to
exchange a secret key
Algorithm
Applications:
ELGAMAL CRYPTOSYSTEM