- Trending Categories
- Data Structure
- Operating System
- MS Excel
- C Programming
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
What are the application of Public Key Cryptography in Information Security?
The public key cryptography is treated as the most secure cryptography to make digital signatures and to implement encryption process. The management of digital signature will be treated as the most secured service in future for on-line communications. Therefore, it can perform secure online communications the public key cryptography plays an essential role in cryptography.
There are various application of Public key cryptography which are as follows −
Digital signatures − It is a message produced by user’s private key used as authenticity of a user. The digital signature generated by the private key of a user and hash algorithm. First the message is encrypted by the private key of the user. The encrypted message creates a signature for user after using the hash algorithm on it.
Encryption − It can transform the plaintext into unreadable format, and it can be used to connect message securely to receiver. Encryption is a procedure that scrambles information to protect it from being read by anyone but the intended receiver. An encryption device encrypts information before locating it on a network. A decryption device decrypts the information before passing it to an application.
A router, server, end system, or dedicated tool can facilitate as an encryption or decryption device. Data that is encrypted is known as ciphered data (or simply encrypted data). Data that is not encrypted is known as plain text or clear text.
Authentication − It can certify that the message or user is legal or not. Authentication represent that users are who they request to be. Availability describe that resources are accessible by authorized parties such as “denial of service” attacks, which are the sensitive matter of national information, are attacks against availability.
Non-repudiation − The message sender does not decline the signature after communication. Non-repudiation defines that a person who sends a message cannot decline that sent it and, conversely, that a person who has received a message cannot decline that received it. Furthermore these technical elements, the conceptual reach of information security is broad and versatile.
Integrity − The signature provides the received message is not modified. Integrity describe that that information is secured against unauthorized changes that are not distinguishable to authorized users; some incidents of hacking compromise the integrity of databases and several resources.
Confidentiality − The communicated message is encrypted by the public key of receiver such that only the pre-determined user’s private key can be used to decrypt the message.
Key generation − Each user generates two keys including public key and private key. The private key maintain at user side and public key is freely accessible in the network.
Signing − Each user can implement signing operation using its private key.
Verification − The signed signature is verified by the public key of concerned user.
- Related Articles
- What is Public key cryptography in information security?
- What are the application of Public Key Cryptosystem in Information Security?
- What are the Symmetric Key Cryptography in information security?
- What are the principles of Public key Cryptosystem in Information Security?
- What are the functions of Public key Cryptography?
- What is Asymmetric Key Cryptography in information security?
- What is Public-Key Cryptosystem in Information Security?
- What are the applications of cryptography in information security?
- What are cryptography, symmetric and public key algorithms?
- What is Cryptography in information security?
- What is the purpose of Cryptography in Information Security?
- What are the basic terms used in cryptography in information security?
- What are the Key Success Factors in Information Security?
- Public Key Cryptography Beginner's Guide
- What is Key Management in Information Security?