Just another tech site

3. Public Key Algorithm


Approach

Public-key encryption (also called asymmetric encryption) involves a pair of keys—a public key and a private key—associated with an entity that needs to authenticate its identity electronically or to sign or encrypt data. Each public key is published, and the corresponding private key is kept secret.[1]

Public Key : ENCRIPTION
Private Key : DECRIPTION

PUBLIC KEY PRIVATE KEY
PK001 PR001
PK002 PR002
PK003 PR003

Algorithm

RSA contains the following elements

1. Key Generation Algorithm
2. Encription
3. Decryption
4. Digital signing
5. Signature verification

Reference

[1] http://download.oracle.com/docs/cd/E19424-01/820-4811/gbesy/index.html
[2] http://en.wikipedia.org/wiki/RSA

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Tag Cloud

%d bloggers like this: