Asymmetric encryption, also known as public-key cryptography, is a type of encryption that uses a pair of keys to encrypt and decrypt data.
The pair of keys includes a public key, which can be shared with anyone, and a private key, which is kept secret by the Owner.
The sender uses the recipient’...
Asymmetric encryption, also known as public-key cryptography, is a type of encryption that uses a pair of keys to encrypt and decrypt data.
The pair of keys includes a public key, which can be shared with anyone, and a private key, which is kept secret by the Owner.
The sender uses the recipient’s public key to encrypt the data. The recipient then uses their private key to decrypt the data.
Digital Signature:A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software, or digital document.
Digital signatures can provide evidence of origin, identity and status of electronic documents, transactions or digital messages.
Size: 127.02 KB
Language: en
Added: May 09, 2024
Slides: 13 pages
Slide Content
Information Security Asymmetric Cryptography & Digital Signature
Asymmetric Cryptography Asymmetric encryption, also known as public-key cryptography, is a type of encryption that uses a pair of keys to encrypt and decrypt data. The pair of keys includes a public key, which can be shared with anyone, and a private key, which is kept secret by the Owner. T he sender uses the recipient’s public key to encrypt the data. The recipient then uses their private key to decrypt the data. Add a footer 2
Alice composes and encrypts an email for Bob using Bob’s public key. She follows up by sending Bob the encrypted email. After receiving the email, Bob uses his private key to decrypt it so that it may be read . As a result, Alice can communicate Bob securely without being concerned that the message’s content will be viewed by someone else . Example of Asymmetric Encryption Add a footer 3
Dual Keys Encryption and D ecryption Digital Signatures Secure Key Exchange Security Main F eatures of Asymmetric E ncryption Add a footer 4
Dual Key: Asymmetric encryption uses a pair of keys, including a public key and a private key. The public key can be freely shared with anyone, while the private key is kept secret and known only to the key owner . Encryption and decryption : Asymmetric encryption uses the public key to encrypt data and the private key to decrypt data. This allows secure communication between two parties without the need to exchange secret keys. Digital signatures: Asymmetric encryption enables the creation of digital signatures, which can be used to verify the authenticity of data. A digital signature is created by encrypting a hash of the data with the sender’s private key.
Secure key exchange Asymmetric encryption allows for secure key exchange, which is a critical feature in secure communication. For example, the Diffie -Hellman key exchange algorithm uses asymmetric encryption to establish a shared secret key between two parties without exchanging the key itself. Security: Asymmetric encryption is considered more secure than symmetric encryption because it eliminates the need to exchange secret keys, which can be a security risk . Additionally, the private key is kept secret, which makes it harder for attackers to intercept or tamper with the data.
Digital Signatures
A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software, or digital document. Digital signatures can provide evidence of origin, identity and status of electronic documents, transactions or digital messages. Digital Signature Add a footer 8
Digital signatures are based on public key cryptography, also known as asymmetric cryptography. Using a public key algorithm -- such as RSA -- two keys are generated, creating a mathematically linked pair of keys: one private and one public . As a result, Alice can communicate Bob securely without being concerned that the message’s content will be viewed by someone else . How do digital signatures work? Add a footer 9
Digital signatures work through public key cryptography's two mutually authenticating cryptographic keys. For encryption and decryption, the person who creates the digital signature uses a private key to encrypt signature-related data. The only way to decrypt that data is with the signer's public key. If the recipient can't open the document with the signer's public key, that indicates there's a problem with the document or the signature. This is how digital signatures are authenticated. How do digital signatures work? Add a footer 10
Financial Documents: Finance departments digitally sign invoices so customers can trust that the payment request is from the right seller, not from a bad actor trying to trick the buyer into sending payments to a fraudulent account. Health Data: In the healthcare industry, privacy is paramount for both patient records and research data. Digital signatures ensure that this confidential information was not modified when it was transmitted between the consenting parties. Benefits of Digital Signatures Add a footer 11
Legal documents and contracts: Digital signatures are legally binding. This makes them ideal for any legal document that requires a signature authenticated by one or more parties and guarantees that the record has not been altered. Sales contracts: Digital signing of contracts and sales contracts authenticates the identity of the seller and the buyer, and both parties can be sure that the signatures are legally binding and that the terms of the agreement have not been changed . Benefits of Digital Signatures Add a footer 12