Question

1. How can public-key encryption be used to distribute a secret key? What is the benefit...

1. How can public-key encryption be used to distribute a secret key? What is the benefit of doing this?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

In Public Key Encryption two keys are used for message encryption and decryption.

Keys used in is Public Key Encryption are Public and Private key.

Public Key-: It is the key that is known by everyone in the network. It is common to all. This key is share by your computer to other computers or system in the network who wants to communicate with them.

Private Key-: This key also known by your computer. This key is private for every user. Every Sender or receiver or computers sharing message to a network is having one private key that is known by only them.

How Public Key Encryption Works -: When Sender wants to send the message, sender use receiver public key to encrypt the message and send the message over the network. All User in the network can receive the message but cannot read it. Because the message can be decrypt by only receiver private key. hence for others computer those are in network for that message don’t have any meaning as they don’t have key to decrypt the message.

What is the benefit of doing this?

  1. Public Key Encryption is more secure than passwords. Hacker must obtain Private key of the user to destroy the message or use that message for wrong things.
  2. Provide Strong authentication because message can be decrypt only by the receiver private key that is known by receiver only.
  3. In this non- interactive login is also possible.
Add a comment
Know the answer?
Add Answer to:
1. How can public-key encryption be used to distribute a secret key? What is the benefit...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...

    Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Jane and Karl. Show explanation with a diagram.

  • The Diffie-Hellman public-key encryption algorithm is an alternative key exchange algorithm that is used by protocols...

    The Diffie-Hellman public-key encryption algorithm is an alternative key exchange algorithm that is used by protocols such as IPSec for communicating parties to agree on a shared key. The DH algorithm makes use of a large prime number p and another large number, g that is less than p. Both p and g are made public (so that an attacker would know them). In DH, Alice and Bob each independently choose secret keys, ?? and ??, respectively. Alice then computes...

  • Use C++ forehand e receiver creates a public key and a secret key as follows. Generate...

    Use C++ forehand e receiver creates a public key and a secret key as follows. Generate two distinct primes, p andq. Since they can be used to generate the secret key, they must be kept hidden. Let n-pg, phi(n) ((p-1)*(q-1) Select an integer e such that gcd(e, (p-100g-1))-1. The public key is the pair (e,n). This should be distributed widely. Compute d such that d-l(mod (p-1)(q-1). This can be done using the pulverizer. The secret key is the pair (d.n)....

  • According to this paper entitled "Using Commutative Encryption to Share a Secret" they define their modulus...

    According to this paper entitled "Using Commutative Encryption to Share a Secret" they define their modulus to be a large prime p, which is public. Both exponents are private in this case. According to the wikipedia article on RSA link the modulus has to be a product of two primes, and " p, q, and ?(n) must also be kept secret because they can be used to calculate d.", and the exponent can be public. In the paper both the...

  • 1. (a) Explain the terms “data encryption, authentication, and message integrity,” often used in the networks...

    1. (a) Explain the terms “data encryption, authentication, and message integrity,” often used in the networks security literature. (3 Points) (b) Lorenzo likes to send to his close friend Art a secret market data related to their business using public key cryptography (RSA algorithm). He chooses two prime numbers 7 and 11, and a public key e = 13 to encrypt the data. Art uses d=37 to decrypt the data. Indicate why (e, 77) and (d, 77) are valid public...

  • Suppose we have a public-key infrastructure in place--each user U has a public key pKU for...

    Suppose we have a public-key infrastructure in place--each user U has a public key pKU for a public-key encryption scheme and these public keys are available to all users. Suggest a protocol which allows four parties to establish a common secret key over a public network. You may assume that the adversary is passive, i.e., the adversary eavesdrops but does not delete, modify, or send messages.

  • In a public key encryption system, the values p = 7, q = 11, s =...

    In a public key encryption system, the values p = 7, q = 11, s = 53 are selected. A numerical message x is then encrypted using the function y=x' mod pg. What was the original message x if the received message is y = 67? You may leave your answer in terms of an exponent. Explain why it is necessary in public key encryption to choose s to be relatively prime to (p-1)(9 – 1).

  • 1. In a scenario where Nancy and Matthew are using public key encryption, which keys will...

    1. In a scenario where Nancy and Matthew are using public key encryption, which keys will Matthew have the ability to see in his public keyring (--list-keys)? 2.    If Nancy wishes to send a message to Matthew, which key does she use to encrypt the message? 3.    If Matthew receives an encrypted message from Nancy, which key does he use to read it?   4.    If Matthew wishes to send a message to Nancy, which key does he use to encrypt...

  • Exercise 3.2 (Symmetric and Asymmetric Encryption) t In this exercise, you will send an encrypted...

    Exercise 3.2 (Symmetric and Asymmetric Encryption) t In this exercise, you will send an encrypted message from a socket client to a socket server. The message will be encrypted using AES symmetric encryption algorithm in the client. The server receives this ciphertext and decrypt it using the same symmetric key. Before communication over symmetric encryption, you need to first securely distribute the symmetric key between sender and receiver. You can use asymmetric encryption to help distribute the symmetric key. The...

  • Network Encryption false -Can be used on compressed data true true Ofalse - can not be...

    Network Encryption false -Can be used on compressed data true true Ofalse - can not be used for TCP messages true false - public key privite key pairs are created independently true false - Is handled in the Presentation layer In the OSI model Record Answer

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT