Friday, September 13, 2019
Information Technology Essay Example | Topics and Well Written Essays - 1000 words - 1
Information Technology - Essay Example 2007). Similarly, the RSA cryptography standard is associated with a Public Key Cryptography Standards (PKCS) that highlights data encryption by utilizing RSA algorithm. The primary objective or reason for this standard is the construction of digital envelops and digital signatures. Moreover, the standard also defines syntax for private and publics keys of RSA. The syntax is utilized for digital certificates and the syntax for private keys is utilized for private key encryption (RSA Cryptography Standard. 2007). Public key cryptography relies on algorithms associated with asymmetric cryptography along with two incorporated keys i.e. a public key and a private key. Likewise, these two keys are separate and are utilized for decrypting and encrypting data or messages. If any user composes an electronic mail, he or she possesses a private for the email themselves. However, if the sender tries to open the email, he or she must possess a public key for accessing it. RSA public key encrypti on algorithm converts the private key to public key. Moreover, a signature algorithm that ensures authenticity of the sender can be incorporated with the private key without the intervention of the private key, as fundamentally it will not be possible to search two messages possessing similar signatures. The PKCS incorporates different versions such as v 2.1 standards that are associated with deploying public key cryptographic encryption along with digital signatures with appendix. Moreover, it also reflects ANS.1 syntax that illustrates keys for identifying different schemes. RSA is basically a public key algorithm that is invented by Rivest, Shamir and Adleman (Biskup) and is focused on an exponentiation module that comprises of two great prime numbers. Likewise, the security incorporated in RSA algorithm is focused on the solidity of multiplying the procedure associated with great prime numbers. Moreover, in the next version i.e. version 2.1, RSA multiprime function was incorpora ted. The table 1.1 shows the encryption and decryption of messages by private and public keys. Activity Keys Sending an Encrypted Message or data Utilizing the receivers public key Sending an encrypted signature Utilizing the senderââ¬â¢s private key Decrypting an encrypted message Utilizing the receivers private key Decrypting an encrypted signature Utilizing the senderââ¬â¢s public key Figure 1.1 Comparison X.509 and PGP X.509 is considered to be an ITU-T standard that is known for Public Key Infrastructure (PKI). Likewise, it specifies standardized formats associated with public key certificates and a validation algorithm for certification path. Moreover, this standard was preliminary developed in 1988 and was integrated with X.500 standard (X.509. 2007). After the integration, it was considered to be a solid hierarchical mechanism of Certificate Authorities (CA) that is responsible for issuing certificates. It is a fact that X.500 system was not completely deployed, as the IETF working group associated with public key infrastructure has acquired the standard for Internet that is considered to be a flexible environment (X.509. 2007). Besides, in the year 1998, PGP was considered to be a relatively low cost solution possessing features such as robust file, disk and email encryption suite that is based on Network
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.