1. 1 The Motivation




Download 0.89 Mb.
bet11/32
Sana22.07.2021
Hajmi0.89 Mb.
#15652
1   ...   7   8   9   10   11   12   13   14   ...   32
4.3.2 Asymmetric Encryption
Asymmetric Encryption is an alternative encryption technique where everyone has two keys, one which is called a public key and one which is called a private key. Encryption involves using a one way encryption algorithm with the data to compress and the person public key in which anyone can see. The result of this algorithm is a cipher text that can only be decrypted using the person private key. A person public key can be seen by anyone since the private key can not be deduced; therefore this method solves the problems of agreeing in a secure manner on an encryption key. Diagram 5, below illustrates asymmetric encryption in a clear form.



Diagram 5, Illustrates Asymmetric Encryption
The main advantage of this method is that there is no need ever to send a persons private key to another party. All encryption is done using the persons public key which can be seen by anyone. This form of encryption can easily be performed between to parties without the need for any other which solves a lot of scalability issues of dealing with authentication servers. However the process of encryption and decryption using asymmetric encryption is one which is long and complex, this type of encryption can take between 1000 and 10000 times longer to perform than with symmetric encryption. Since a primary requirement is minimising delay it would be impractical to choice this method.


Download 0.89 Mb.
1   ...   7   8   9   10   11   12   13   14   ...   32




Download 0.89 Mb.