Search the Q&A Archives

# I am prasad and i am very interested in cryptanalysis. I am...

<< Back to: Cryptography FAQ (01/10: Overview)

 Question by prasad Submitted on 1/15/2004 Related FAQ: Cryptography FAQ (01/10: Overview) Rating: Rate this question: N/A Worst Weak OK Good Great I am prasad and i am very interested in cryptanalysis. I am confusing with keys. what a public key and private key.Show one example for encryption technique.

 Answer by Anitha Submitted on 2/12/2004 Rating: Not yet rated Rate this answer: N/A Worst Weak OK Good Great private key is the one which sender or receiver will be knowing but the public key is the one which everyone will be knowing.This is private and public key Example sender will encrypt the message with private key and receiver will decrypt with public key this is assymetric encryption Ex:RSA algorithm. you go through some of the algorithms

 Answer by ambi Submitted on 2/17/2004 Rating: Rate this answer: N/A Worst Weak OK Good Great cryptanalysis bole tho

 Answer by Balu Submitted on 6/27/2004 Rating: Rate this answer: N/A Worst Weak OK Good Great Public key is used to encrypt the message. Private key is used to decrypt the message. The keys are strongly related.

 Answer by ashu Submitted on 3/28/2006 Rating: Not yet rated Rate this answer: N/A Worst Weak OK Good Great A cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message. When John wants to send a secure message to Jane, he uses Jane's public key to encrypt the message. Jane then uses her private key to decrypt it. An important element to the public key system is that the public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them. Moreover, it is virtually impossible to deduce the private key if you know the public key. Public-key systems, such as Pretty Good Privacy (PGP), are becoming popular for transmitting information via the Internet. They are extremely secure and relatively simple to use. The only difficulty with public-key systems is that you need to know the recipient's public key to encrypt a message for him or her. What's needed, therefore, is a global registry of public keys, which is one of the promises of the new LDAP technology.

Your answer will be published for anyone to see and rate.  Your answer will not be displayed immediately.  If you'd like to get expert points and benefit from positive ratings, please create a new account or login into an existing account below.

FAQS.ORG reserves the right to edit your answer as to improve its clarity.  By submitting your answer you authorize FAQS.ORG to publish your answer on the WWW without any restrictions. You agree to hold harmless and indemnify FAQS.ORG against any claims, costs, or damages resulting from publishing your answer.

FAQS.ORG makes no guarantees as to the accuracy of the posts. Each post is the personal opinion of the poster. These posts are not intended to substitute for medical, tax, legal, investment, accounting, or other professional advice. FAQS.ORG does not endorse any opinion or any product or service mentioned mentioned in these posts.

<< Back to: Cryptography FAQ (01/10: Overview)