Encryption Method: The Decryption Method

2953 Words12 Pages
Rivest, R.L., et al [1977]: An encryption method was presented in the paper with the then relatively new and novel property that publicly revealing an encryption key did not thereby reveal the corresponding decryption key. This had two important consequences: 1) Couriers or other secure means were not needed to transmit keys, since a message could be enciphered using an encryption key publicly revealed by the intended recipient. Only he could decipher the message, since only he knew the corresponding decryption key. 2) A message could be “signed" using a privately held decryption key. Anyone could verify this signature using the corresponding publicly revealed encryption key. Signatures could not be forged, and a signer could not later deny the validity of his signature. This had obvious applications in “electronic mail" and “electronic funds transfer" systems. Their encryption function was the only candidate for a “trap-door one-way permutation" known to the authors. However, they conceded that it might be desirable to find other examples, to provide alternative implementations should the security of their system turn out someday to be inadequate. This technique though, remains the most popular technique still in use. [1] Boneh, D., [2000]: The attack on RSA cryptosystems is the science of breaking the encoded data. The attacks toward the smart IC card device of the RSA cryptosystem can be classified into two basic categories as the traditional mathematical attacks and the implementation attacks. The traditional mathematical attacks are algorithms modeled as ideal mathematical objects. Attacks of this kind are typically generalized and mostly theoretical rather than operational. The physical implementation attacks strategies ar... ... middle of paper ... ...s are a vital component of Information Security as a means of securing modern networks against would-be attackers by providing data integrity, encryption and authentication to network traffic at the transport layer. Sensitive information, such as banking details, that transverses networks will most likely do so through an encrypted tunnel provided by the cryptographic protocol; it is thus imperative that both the protocol itself is secure and the applications use of the protocol is correct and sensible. It is clearly apparent that it is no longer possible to be an expert within Information Security but rather an expert in one of its subsidiary fields. Cryptography is a field of great interest both academically and economically and the intelligent use of cryptography will lead to improved user satisfaction and safety when using networks to perform confidential tasks.
Open Document