Basics of Asymmetric Crypto-systems:

In networking and telecommunications, the data is transmitted over a network in such a way that if the data is captured, it cannot be read by unauthorized users. Cryptography comes from the Greek words "secret writing". It has a long and colorful history going back thousands of years. Cryptography is the science of information security. It is closely related to the disciplines of cryptology (it is the mathematics, such as a number theory and the application of formulas and algorithms) and crypto-analysis (it refers to the study of ciphers, ciphertext to find weaknesses in them that will permit retrieval of the plain text from the ciphertext, without necessarily knowing the key or the algorithms). Cryptography includes techniques, such as micro-dots, merging words with images, and other ways to hide information in storage or transit. However, cryptography is most often associated with scrambling plain test (ordinary text) into ciphertext (a process called encryption), then back again (known as decryption). Individuals who practice this field are known as Cryptographers. Cryptography is a tool that can be used to keep information confidential and to ensure its integrity and authenticity.

Asymmetric Encryption

Cryptographic techniques allow a sender to dis-guise the date so that an intruder can gain no information from the intercepted data. Cryptography involves two corresponding processes. These processes are described as under:

1. Encryption: It is the process of taking data and modifying it so that it cannot be read by untrusted users.

2. Decryption: it is the process of taking encrypted data and rendering it readable for trusted users.

Encryption and Decryption are performed using algorithms and keys. An algorithm, a series of the mathematical steps that scamble data, is the underlying mathematical process behind encryption. There are a variety of cryptographic algorithms that have been developed based on different mathematical processes. Some algorithms result in stronger encryption than others-the stronger the algorithm, the more difficult the encrypted data is to crack.

There are two broad classes of crypto-systems:
1. Symmetric: In a symmetric crypto-system, either the encryption key and decryption key are the same or one is easily derivable from the other.

2. Asymmetric: In an asymmetric crypto-system, on the other hand, the decryption key is not equal to the encryption key. Furthermore, it is computationally impact to derive a decryption key from the encryption key.

Traditional cryptography (secret key cryptography or symmetric cryptography) involves a private or secret key that was shared by the individuals involved in the transmission. The key is a mathematical entity that the sender can use to encrypt a message and the receiver can use to decrypt it. The main problem with this type of cryptography is that how the owner of the key can securely transmit the key to those who will need it to decrypt messages sent to them.

Public key cryptography (asymmetric crypto-system) solves this problem by creating a set of two different keys for anyone needing to transmit encrypted information. A precise mathematical relationship exists between the two keys, which together are called a key pair. Both the keys are produced at the same time using an algorithm. As a result, when either one of two keys is used to encrypt a message, the other can be used to decrypt it.

The two keys in a pair are as follows:
1. Private key: A private key is known only to the owner (or the owner's client program).

2. Public key: A public key is distributed to any user (or to any client program) who requests it. Because the public and private keys are related mathematically calculation on it and extract the corresponding private key. Therefore, use keys sufficiently long and with a sufficiently complex mathematical relationship so that it is all but impossible to extract the private key from the public one.

Once a key pair is generated for someone, he/she can use it to encrypt messages and digitally sign messages so that the recipient can be sure of the identity of the sender.

The whole public key cryptography system is founded on trust. All persons who are issued key pairs must trust the third-party authority who provided the key pairs. This trusted authority is called a Certificate Authority (CA). Someone who wants to obtain a key pair from a CA must contract CA and present proof of identity. This could involve a face-to-face meeting, examination of a driver's license with a photograph, or some other method of establishing a user's identity.

What is TCP/IP? How To Work TCP/IP ? Most Common TCP/IP protocols

What is TCP/IP? How To Work TCP/IP ? Most Common TCP/IP protocols :


TCP/IP is an industry-standard protocol suit for Wide Area Networks (WANs) developed in the 1970s and 1980 by the U.S Department of Defense (DoD).

Read More
learn about IP address and their classes (including IP class ranges)

Learn about IP address and their classes (including IP class ranges) :


Each computer on a TCP/IP based network (including the internet) has a unique, numeric address called an IP (Internet Protocol) address, enabling data packages to be addressed.

Read More
What is a Database/DBMS? Some Types of DBMSes with Advantages or Disadvantages

What is a Database/DBMS? Some Types of DBMSes with Advantages or Disadvantages :


A Database is a collection of related data organized in a way that data can be easily accessed, managed and updated. Database can be software based or hardware based.

Read More

Next Update


We have a YouTube channel for live game streaming purposes, the channel name is "NightHawk". You can visit our gaming channel and support us, Thank you