[ Home  |  FAQ-Related Q&As  |  General Q&As  |  Answered Questions ]


    Search the Q&A Archives


I am prasad and i am very interested in cryptanalysis. I am...

<< Back to: Cryptography FAQ (01/10: Overview)

Question by prasad
Submitted on 1/15/2004
Related FAQ: Cryptography FAQ (01/10: Overview)
Rating: Rate this question: Vote
I am prasad and i am very interested in cryptanalysis. I am confusing with keys.
what a public key and private key.Show one example for encryption technique.


Answer by Anitha
Submitted on 2/12/2004
Rating: Not yet rated Rate this answer: Vote
private key is the one which sender or receiver will be knowing but the public key is the one which everyone will be knowing.This is private and public key
Example
sender will encrypt the message with private key and receiver will decrypt with public key
this is assymetric encryption Ex:RSA algorithm.
you go through some of the algorithms

 

Answer by ambi
Submitted on 2/17/2004
Rating:  Rate this answer: Vote
cryptanalysis bole tho

 

Answer by Balu
Submitted on 6/27/2004
Rating:  Rate this answer: Vote
Public key is used to encrypt the message.
Private key is used to decrypt the message.
The keys are strongly related.

 

Answer by ashu
Submitted on 3/28/2006
Rating: Not yet rated Rate this answer: Vote
A cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message. When John wants to send a secure message to Jane, he uses Jane's public key to encrypt the message. Jane then uses her private key to decrypt it.

An important element to the public key system is that the public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them. Moreover, it is virtually impossible to deduce the private key if you know the public key.

Public-key systems, such as Pretty Good Privacy (PGP), are becoming popular for transmitting information via the Internet. They are extremely secure and relatively simple to use. The only difficulty with public-key systems is that you need to know the recipient's public key to encrypt a message for him or her. What's needed, therefore, is a global registry of public keys, which is one of the promises of the new LDAP technology.

 

Your answer will be published for anyone to see and rate.  Your answer will not be displayed immediately.  If you'd like to get expert points and benefit from positive ratings, please create a new account or login into an existing account below.


Your name or nickname:
If you'd like to create a new account or access your existing account, put in your password here:
Your answer:

FAQS.ORG reserves the right to edit your answer as to improve its clarity.  By submitting your answer you authorize FAQS.ORG to publish your answer on the WWW without any restrictions. You agree to hold harmless and indemnify FAQS.ORG against any claims, costs, or damages resulting from publishing your answer.

 

FAQS.ORG makes no guarantees as to the accuracy of the posts. Each post is the personal opinion of the poster. These posts are not intended to substitute for medical, tax, legal, investment, accounting, or other professional advice. FAQS.ORG does not endorse any opinion or any product or service mentioned mentioned in these posts.

 

<< Back to: Cryptography FAQ (01/10: Overview)


[ Home  |  FAQ-Related Q&As  |  General Q&As  |  Answered Questions ]

© 2008 FAQS.ORG. All rights reserved.