0% found this document useful (0 votes)
45 views1 page

Department of Information Technology 8IT2: Information System Security Unit - Ii Tutorial Sheet No.: 1 (B)

This document discusses public key cryptography and the RSA algorithm. Public key cryptography uses a public key and private key system where the public key can encrypt messages but only the private key can decrypt them, providing security. The RSA algorithm generates the public and private keys through a key generation process that involves choosing prime numbers and performing mathematical operations on them.

Uploaded by

krishnamamta
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views1 page

Department of Information Technology 8IT2: Information System Security Unit - Ii Tutorial Sheet No.: 1 (B)

This document discusses public key cryptography and the RSA algorithm. Public key cryptography uses a public key and private key system where the public key can encrypt messages but only the private key can decrypt them, providing security. The RSA algorithm generates the public and private keys through a key generation process that involves choosing prime numbers and performing mathematical operations on them.

Uploaded by

krishnamamta
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

DEPARTMENT OF INFORMATION TECHNOLOGY 8IT2: Information System Security UNIT - II TUTORIAL SHEET NO.: 1(B) Q1.

What is private key cryptography? Q2. What is public key cryptography? Q3. Why to use public key cryptography? Q4. What are the security schemes of public key cryptography? Q5. What is the key setup for RSA algorithm? Q6. How the key generation is done in RSA algorithm?

You might also like