5 advantages and disadvantages of rsa algorithm
#1

What are the advantages and disadvantages of rsa algorithm?
Next, i want to know about the application of rsa algorithm in daily life.tq
Reply
#2
5 advantages and disadvantages of rsa algorithm

The primary advantage of public-key cryptography is increased security and convenience: private keys never need to be transmitted or revealed to anyone. In a secret-key system, by contrast, the secret keys must be transmitted (either manually or through a communication channel) since the same key is used for encryption and decryption. A serious concern is that there may be a chance that an enemy can discover the secret key during transmission.

Another major advantage of public-key systems is that they can provide digital signatures that cannot be repudiated. Authentication via secret-key systems requires the sharing of some secret and sometimes requires trust of a third party as well. As a result, a sender can repudiate a previously authenticated message by claiming the shared secret was somehow compromised (see Question 4.1.2.3) by one of the parties sharing the secret. For example, the Kerberos secret-key authentication system (see Question 5.1.6) involves a central database that keeps copies of the secret keys of all users; an attack on the database would allow widespread forgery. Public-key authentication, on the other hand, prevents this type of repudiation; each user has sole responsibility for protecting his or her private key. This property of public-key authentication is often called non-repudiation.

A disadvantage of using public-key cryptography for encryption is speed. There are many secret-key encryption methods that are significantly faster than any currently available public-key encryption method. Nevertheless, public-key cryptography can be used with secret-key cryptography to get the best of both worlds. For encryption, the best solution is to combine public- and secret-key systems in order to get both the security advantages of public-key systems and the speed advantages of secret-key systems. Such a protocol is called a digital envelope, which is explained in more detail in Question 2.2.4.

Public-key cryptography may be vulnerable to impersonation, even if users' private keys are not available. A successful attack on a certification authority (see Question 4.1.3.14) will allow an adversary to impersonate whomever he or she chooses by using a public-key certificate from the compromised authority to bind a key of the adversary's choice to the name of another user.

In some situations, public-key cryptography is not necessary and secret-key cryptography alone is sufficient. These include environments where secure secret key distribution can take place, for example, by users meeting in private. It also includes environments where a single authority knows and manages all the keys, for example, a closed banking system. Since the authority knows everyone's keys already, there is not much advantage for some to be "public" and others to be "private." Note, however, that such a system may become impractical if the number of users becomes large; there are not necessarily any such limitations in a public-key system.

Public-key cryptography is usually not necessary in a single-user environment. For example, if you want to keep your personal files encrypted, you can do so with any secret key encryption algorithm using, say, your personal password as the secret key. In general, public-key cryptography is best suited for an open multi-user environment.

Public-key cryptography is not meant to replace secret-key cryptography, but rather to supplement it, to make it more secure. The first use of public-key techniques was for secure key establishment in a secret-key system [DH76]; this is still one of its primary functions. Secret-key cryptography remains extremely important and is the subject of much ongoing study and research. Some secret-key cryptosystems are discussed in the sections on block ciphers and stream ciphers.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: advantages and disadvntages of rsa algorithm, md5 algorithm advantages and disadvantages, 5 advantages and disadvantages of rsa algorithm, advantages and disadvantages of dijkstra algorithm ppt, 5 advantages and disadvantages of rsa algorithmool nomenclature ppt, what are the advantages and disadvantages of dda algorithm, disadvantages of rsa alogorithum,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  advatages disadvantages of microcontroller based anesthesia injector 4 2,552 29-06-2018, 10:19 PM
Last Post: Guest
Smile mesotechnology inventions advantages and disadvantages 1 8,352 03-05-2018, 09:23 AM
Last Post: Guest
  ppt on design and implementation of intelligent campus security tracking system based on rfid and zigbee 7 16,033 09-02-2018, 02:20 PM
Last Post: udaya
Smile physics investigatory projects for class 12 cbse to set up a common base transistor circuit and to study its input and o 3 25,130 20-12-2017, 09:44 AM
Last Post: jaseela123d
  plastic money marathi information advantages and disadvantages 4 8,036 05-12-2017, 09:33 AM
Last Post: jaseela123d
  plastic money marathi information advantages and disadvantages 10 5,854 20-10-2017, 10:29 PM
Last Post: hitesh borade
  booths algorithm multiplication 8085 4 2,469 11-05-2017, 11:25 AM
Last Post: jaseela123d
  advantages and disadvantages of cnt in sub tera hertz range 1 926 12-04-2017, 04:24 PM
Last Post: jaseela123d
  disadvantages of underground cable fault distance locator 1 1,302 12-04-2017, 03:52 PM
Last Post: jaseela123d
  code for deduplication using genetic algorithm 1 901 12-04-2017, 03:42 PM
Last Post: jaseela123d

Forum Jump: