Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are the advantages and disadvantages of public key
cryptography compared with secret key cryptography ?

Answer Posted / prashant

The primary advantage of public-key cryptography is
increased security and convenience: private keys never need
to transmitted or revealed to anyone. In a secret-key
system, by contrast, the secret keys must be transmitted
(either manually or through a communication channel), and
there may be a chance that an enemy can discover the secret
keys during their transmission.

Another major advantage of public-key systems is that they
can provide a method for digital signatures. Authentication
via secret-key systems requires the sharing of some secret
and sometimes requires trust of a third party as well. As a
result, a sender can repudiate a previously authenticated
message by claiming that the shared secret was somehow
compromised by one of the parties sharing the secret. For
example, the Kerberos secret-key authentication system
involves a central database that keeps copies of the secret
keys of all users; an attack on the database would allow
widespread forgery. Public-key authentication, on the other
hand, prevents this type of repudiation; each user has sole
responsibility for protecting his or her private key. This
property of public-key authentication is often called non-
repudiation.

A disadvantage of using public-key cryptography for
encryption is speed: there are popular secret-key
encryption methods that are significantly faster than any
currently available public-key encryption method.
Nevertheless, public-key cryptography can be used with
secret-key cryptography to get the best of both worlds. For
encryption, the best solution is to combine public- and
secret-key systems in order to get both the security
advantages of public-key systems and the speed advantages
of secret-key systems. The public-key system can be used to
encrypt a secret key which is used to encrypt the bulk of a
file or message. Such a protocol is called a digital
envelope, which is explained in more detail in Question 16
in the case of RSA.

Public-key cryptography may be vulnerable to impersonation,
however, even if users' private keys are not available. A
successful attack on a certification authority (see
Question 127) will allow an adversary to impersonate
whomever the adversary chooses to by using a public-key
certificate from the compromised authority to bind a key of
the adversary's choice to the name of another user.

In some situations, public-key cryptography is not
necessary and secret-key cryptography alone is sufficient.
This includes environments where secure secret-key
agreement can take place, for example by users meeting in
private. It also includes environments where a single
authority knows and manages all the keys, e.g., a closed
banking system. Since the authority knows everyone's keys
already, there is not much advantage for some to
be "public" and others "private." Also, public-key
cryptography is usually not necessary in a single-user
environment. For example, if you want to keep your personal
files encrypted, you can do so with any secret-key
encryption algorithm using, say, your personal password as
the secret key. In general, public-key cryptography is best
suited for an open multi-user environment.

Public-key cryptography is not meant to replace secret-key
cryptography, but rather to supplement it, to make it more
secure. The first use of public-key techniques was for
secure key exchange in an otherwise secret-key system
[DH76]; this is still one of its primary functions. Secret-
key cryptography remains extremely important and is the
subject of much ongoing study and research. Some secret-key
cryptosystems are discussed in the sections on block
ciphers and stream ciphers.

Is This Answer Correct ?    10 Yes 4 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is luc?

861


How can we use quantum properties in cryptography ?

1788


Do encrypted files contain password in some form?

2070


How to remove the Kryptel (Silver Key) icon from the desktop?

2007


What is public-key cryptography ?

1834


What is merkles tree signature scheme?

841


A company wants to transmit data over the telephone, but it is concerned that its phones may be tapped. All of its data is transmitted as four-digit integers. It has asked you to write a program that will encrypt its data so that the data may be transmitted more securely. Your script should read a four digit integer entered by the user in a prompt dialog and encrypt it as follows: Replace each digit by (the sum of that digit plus 7) modulus 10. Then swap the first digit with the third, and swap the second digit with the fourth. Then output XHTML text that displays the encrypted integer.

3479


How is an s-box value of AES can be modified? How is it done?

1796


What is cryptographic synchronisation?

2153


what is trapdoor and how does it works?

2060


What are the advantages of public-key cryptography compared with secret-key cryptography?

823


What are some other public key cryptosystems ?

1995


What is the elgamal cryptosystem?

984


What is public key encryption?

1966


What is exhaustive key search ?

2061