Advertisment

Digital Signatures That Use Public-key Can’t be Repudiated

author-image
VoicenData Bureau
New Update

What is cryptography?



To most people, cryptography is concerned with keeping communications private.
Indeed, the protection of sensitive communications has been the emphasis of

cryptography throughout much of its history. As the field of cryptography has

advanced, the definition has blurred. Cryptography today might be summed up as

the study of techniques and applications that depend on the existence of

difficult problems.

Advertisment

Encryption is the transformation of data into a form that is as close to

impossible as possible to read without the appropriate key. Decryption is the

reverse of encryption. But today’s cryptography is more than encryption and

decryption.

Why is cryptography important?



Cryptography allows people to carry over the confidence found in the

physical world to the electronic world, thus allowing people to do business

electronically without worries of deceit and deception. Every day hundreds of

thousands of people interact electronically, whether it is through e-mail,

e-commerce (business conducted over the Internet), ATM machines, or cellular

phones. The perpetual increase of information transmitted electronically has

lead to an increased reliance on cryptography.

Cryptography makes secure web sites and electronic safe transmissions

possible. For a website to be secure all of the data transmitted between the

computers where the data is kept and where it is received must be encrypted.

This allows people to do online banking, online trading, and make online

purchases with their credit cards, without worrying that any of their account

information is being compromised. Cryptography is very important to the

continued growth of the Internet and electronic commerce.

Advertisment

What are some of the more popular techniques in cryptography?



There are two types of cryptosystems: secret-key and public-key

cryptography. In secret-key cryptography, the same key is used for both

encryption and decryption. The most popular secret-key cryptosystem today is the

Data Encryption Standard (DES).

In public-key cryptography, each user has a public key and a private key. The

public key is made public while the private key remains secret. Encryption is

performed with the public key while decryption is done with the private key.

How do identification and authentication work in cryptography?



Identification is the process of verifying someone’s or something’s

identity. For example, when withdrawing money from a bank, a teller asks to see

identification to verify the identity of the owner of the account. The same

process can be done electronically using cryptography. Every automatic teller

machine (ATM) card is associated with a ‘secret’ personal identification

number (PIN), which binds the owner to the card and thus to the account. When

the card is inserted into the ATM, the machine prompts the cardholder for the

PIN. If the correct PIN is entered, the machine identifies that person as the

rightful owner and grants access. Another important application of cryptography

is authentication. Authentication is similar to identification, in that both

allow an entity access to resources (such as an Internet account), but

authentication is broader because it does not necessarily involve identifying a

person or entity. Authentication merely determines whether that person or entity

is authorized for .

Advertisment

What is secret-key cryptography?



Secret-key cryptography is sometimes referred to as symmetric cryptography.

In it, a single key can be used to encrypt and decrypt a message. Secret-key

cryptography not only deals with encryption, but it also deals with

authentication. One such technique is called message authentication codes.

The main problem with secret-key cryptosystems is getting the sender and

receiver to agree on the secret key without anyone else finding out.

What are the advantages of public-key cryptography over secret-key

cryptography?



The primary advantage of public-key cryptography is increased security and

convenience: private keys never need to be transmitted or revealed to anyone. In

a secret-key system, by contrast, the secret keys must be transmitted (either

manually or through a communication channel) since the same key is used for

encryption and decryption. A serious concern is that there may be a chance that

an enemy can discover the secret key during transmission. Another major

advantage of public-key systems is that they can provide digital signatures that

cannot be repudiated.

sureshsrini@rsi.ramco.com

Advertisment