Public Key Algorithm, Digital Signature
Public Key Algorithm, Digital Signature
Signature
SUBMITTED TO = ZAHWA MIRZA SUBMITTED BY = CHARULATA NAGWANSHI
Public Key Algorithm
• Public Key Cryptography (asymmetric) uses encryption algorithms such as
RSA and Elliptic Curve Cryptography (ECC) to create the public and private
keys. These algorithms are based on the intractability of certain
mathematical problems. Problems that can be solved in theory (e.g., given
infinite time), but which in practice take too long for their solutions to be
useful are known as intractable problems.
• With asymmetric encryption it is computationally easy to generate public
and private keys, encrypt messages with the public key, and decrypt
messages with the private key. However, it is extremely difficult (or
impossible) for anyone to derive the private key based only on the public key.
What is RSA Cryptography
• RSA stands for Ron Rivest, Adi Shamir, and Leonard Adleman— the
men who first publicly described the algorithm in 1977.
• The idea of RSA is based on the fact that it is difficult to factorize a
large integer. The public key consists of two numbers where one
number is a multiplication of two large prime numbers. And private
key is also derived from the same two prime numbers. So if somebody
can factorize the large number, the private key is compromised.
Therefore encryption strength totally lies on the key size and if we
double or triple the key size, the strength of encryption increases
exponentially.
What is Elliptic Curve
Cryptography
• It is an asymmetric encryption algorithm that employs the algebraic
architecture of elliptic curves with finite fields.
• Elliptic Curve Cryptography (ECC) is an encryption technology
comparable to RSA that enables public-key encryption.
• While RSA’s security is dependent on huge prime numbers, ECC
leverages the mathematical theory of elliptic curves to achieve the
same level of security with considerably smaller keys.
• There are two component of ECC keys: Private key, Public keys.
Components of Elliptic Curve
Cryptography
• Private key: ECC cryptography’s private key creation is as simple as
safely producing a random integer in a specific range, making it highly
quick. Any integer in the field represents a valid ECC private key.
• Public keys: Public keys within ECC are EC points, which are pairs of
integer coordinates x, and y that lie on a curve. Because of its unique
features, EC points can be compressed to a single coordinate + 1 bit
(odd or even). As a result, the compressed public key corresponds to a
256-bit ECC.
Uses of Public Key Algorithm
• Secure Communication: Public key algorithms enable secure communication over
insecure networks like the internet. They are used in protocols such as TLS/SSL, SSH,
and HTTPS to encrypt data exchanged between clients and servers, ensuring
confidentiality and integrity of transmitted information.
• Secure Email Communication: Public key algorithms are used in email encryption
standards like Pretty Good Privacy (PGP) and S/MIME to encrypt and digitally sign
email messages. This ensures the confidentiality and authenticity of email
communications, protecting sensitive information from unauthorized access and
spoofing.
• Secure Authentication: Public key algorithms are used in authentication
mechanisms such as SSH (Secure Shell) and digital certificates to verify the identity
of users, servers, and devices. By presenting a valid digital certificate signed by a
trusted certificate authority (CA), entities can authenticate themselves securely
without revealing sensitive information.
Digital Signature
• A digital signature is a cryptographic technique used to ensure the
authenticity, integrity, and non-repudiation of digital documents or
messages. Similar to handwritten signatures on physical documents,
digital signatures serve as a unique identifier of the signer and provide
assurance that the contents of the document have not been altered
since the signature was applied.
Working of Digital Signatures
• The signer generates a digital signature by applying a cryptographic algorithm
to the document or message they want to sign.
• First, a hash function is applied to the document, generating a fixed-length
string of characters called a hash value or digest. This hash value uniquely
represents the contents of the document and is typically much shorter than
the original document.
• The signer then encrypts the hash value using their private key, creating the
digital signature. Only the signer's private key can produce a signature that
matches their public key, verifying the authenticity of the signer.
Digital signatures Benefits
• Authentication: Digital signatures provide proof of the signer's identity, ensuring
that the document or message originated from the claimed sender.
• Integrity: Any tampering with the signed document or message, even minor
alterations, will result in a mismatch between the computed hash value and the
decrypted hash value, alerting the recipient to potential modifications.
• Non-repudiation: Since digital signatures are tied to the signer's private key, the
signer cannot deny their involvement in signing the document or message,
providing legal enforceability and accountability.
Uses Of Digital Signature
Digital signatures are widely used in various applications, including
secure email communication, electronic contracts and agreements,
financial transactions, software distribution, and legal documentation.
They play a crucial role in ensuring the security and trustworthiness of
digital interactions in both personal and business contexts.
Thank You