Principles of Public-Key Cryptosystems

If you recall asymmetric encryption, it employs two separate keys, distinct from symmetric encryption's single-key approach. This use of two keys holds significant implications for confidentiality, key distribution, and authentication, as we'll explore in the following sections.

Public-Key Cryptosystems

To discern between symmetric and asymmetric encryption, we refer to the key used in symmetric encryption as a secret key. The two keys used for asymmetric encryption are referred to as the public key and the private key.

  1. Public Key: Available to anyone.
  2. Private Key: Known only to the individual.

Applications for Public-Key Cryptosystems

In public-key cryptosystems, there are three main categories of usage, each involving different aspects of key management:

  1. Encryption/Decryption:
  2. Digital Signature:
  3. Key Exchange:

Some algorithms are suitable for all three applications, whereas others can be used only for one or two of these applications. The table below indicates the applications supported by the algorithms discussed.

Table 2.1 Applications for public-key cryptosystems.

Table 2.1 Applications for public-key cryptosystems.

One in particular which will look further into is RSA.

Requirements for Public-Key Cryptography

The requirements for public-key cryptosystems can be simplified as follows:

  1. Generating a key pair (public key $\text{K}{\text{pub}}$, private key $\text{K}{\text{priv}}$) should be computationally easy for the user.
  2. It should be computationally easy for a sender to generate the ciphertext ($\text{C}$) using the recipient's public key.