Public-Key Cryptology An Asymmetrical Approach to Encryption
Overview Symmetric Cryptology Asymmetric Cryptology Digital Signature Public-Key Utilization Output of Typical Java Public-Key Encryption Program Security Discussion Q&A
Symmetric Cryptology A (unlocked); B(locked) A > B (Locking) B > A (Unlocking)
Digital Signature A, C (Locked); B (Unlocked) A > B > C (Private Key) C > B > A (Public Key)
Public-Key Utilization Reverse of the digital signature method. Public key is used first. C > B > A (Public Key) A > B > C (Private Key) Only the person with the private key can access this message.
Java Program Output Keys are just very large integers. (BigIntegers) This program utilizes the BigInteger class to make keys. Output on next slide.
Output Plaintext: Yellow and Black Border Collies Ciphertext: Plaintext: Yellow and Black Border Collies
Brute Force The only guaranteed method for decrypting an encrypted message without a key is through a brute-force method. Test every integer until it matches the correct key. Use the found BigInteger to decrypt the message. This can take a considerable amount of time. Thus, public-key encryption is extremely secure.
References
Image References