Found 1862 Articles for Data Structure

What are the principles of Public key Cryptosystem in Information Security?

Ginni
Updated on 22-Oct-2023 02:29:38

31K+ Views

Public key cryptography has become an essential means of providing confidentiality, especially through its need of key distribution, where users seeking private connection exchange encryption keys. It also features digital signatures which enable users to sign keys to check their identities. The approach of public key cryptography derivative from an attempt to attack two of the most complex problems related to symmetric encryption. The first issue is that key distribution. Key distribution under symmetric encryption needed such as − that two communicants already shared a key, which somehow has been ... Read More

What are the Miller-Rabin Algorithm for testing the primality of a given number?

Ginni
Updated on 16-Mar-2022 09:48:55

8K+ Views

Miller Rabin is a fast approach to test primality of the large numbers. This algorithm is called a Rabin-miller primality test and this algorithm decides whether number is prime which is same to other tests including Fermat primality Test and Solovay- Strassen primality test.This test is based on equality or group of equalities that hold the true for prime values, thus checks whether they hold for the number, that it is required to test for primality.This algorithm is most useful known primality testing algorithm and can be used in different software libraries that based on RSA encryption and best instance ... Read More

What are the procedure of Miller-Rabin Primality Testing?

Ginni
Updated on 16-Mar-2022 10:27:34

429 Views

The Miller-Rabin Permality test combines the Fermat test and the Fermat root test in a classic method to find a strong pseudoprime. In this test, it can write n – 1 as the product of an odd number m and a power of 2 −$$\mathrm{n-1=m\, x\, 2^{k}}$$The Fermat test in base a can be composed as −$$\mathrm{a^{n-1}\, =\, a^{m\, x\, 2k}=\left [ a^{m} \right ]^{2k}=\left [ a^{m} \right ]\frac{2^{2}\cdot \cdot \cdot 2}{K\, times}}$$In other words, rather than calculating an−1(mod n) in one step, it can do it in k+1 steps. The advantage of using k + 1 is that each ... Read More

What is Primality Testing in Information Security?

Ginni
Updated on 16-Mar-2022 09:32:13

5K+ Views

A primality test is an algorithm to decide whether an input number is prime. Some primality tests are deterministic. They always correctly decide if a number is prime or composite.The fastest known deterministic primality test was invented in 2004. There are three computer scientists, such as Agrawal, Kayal, and Saxena, invented the AKS primality test that operated in O˜ (log(n)6 ) time, where O˜ (f(n)) is represented as O(f(n).log(f(n))k) for some integer k [1]. Although a significant breakthrough, this speed is rather slow when compared to information security requirement.The advantage of prime numbers are that they are utilized in cryptography. ... Read More

What is Euler’s Theorem in Information Security?

Ginni
Updated on 16-Mar-2022 09:24:50

14K+ Views

Euler's theorem is a generalization of Fermat's little theorem handling with powers of integers modulo positive integers. It increase in applications of elementary number theory, such as the theoretical supporting structure for the RSA cryptosystem.This theorem states that for every a and n that are relatively prime −$$\mathrm{a^{\phi \left ( n \right )}\, \equiv\, 1\left ( mod \, n \right ) }$$where $\mathrm{\phi}$(n) is Euler's totient function, which counts the number of positive integers less than n that are relatively prime to n.Consider the set of such integers −R = {x1, x2, … x$\mathrm{\phi}$(n)}, i.e., each element xi of R ... Read More

What is S-Box Substitution?

Ginni
Updated on 16-Mar-2022 07:26:42

9K+ Views

S-Box Substitution is a procedure that accepts the 48-bit input from the XOR operation containing the compressed key and expanded RPT and creates a 32-bit output utilizing the substitution technique.The substitution is implemented by the eight substitution boxes (also known as the S-boxes). Each 8-S-boxes has a 6-bit input and a 4-bit output. The 48-bit input block is divided into 8 sub-blocks (each including 6 bits), and each sub-blocks is provided to an S-box.The substitution in each box follows a pre-decided rule depends on a 4-row by 16- column table. The sequence of bits one and six of the input ... Read More

What are the application of Public Key Cryptography in Information Security?

Ginni
Updated on 15-Mar-2022 12:04:14

3K+ Views

The public key cryptography is treated as the most secure cryptography to make digital signatures and to implement encryption process. The management of digital signature will be treated as the most secured service in future for on-line communications. Therefore, it can perform secure online communications the public key cryptography plays an essential role in cryptography.There are various application of Public key cryptography which are as follows −Digital signatures − It is a message produced by user’s private key used as authenticity of a user. The digital signature generated by the private key of a user and hash algorithm. First the ... Read More

What are the functions of Public key Cryptography?

Ginni
Updated on 15-Mar-2022 11:59:48

488 Views

Public-key cryptography is also known as asymmetric cryptography. It is a form of cryptography in which a user has a set of cryptographic keys including public key and a private key. The functions of Public key Cryptography are as follows −Encryption − The encryption application supports the confidentiality and integrity security services for the information. The public key supports the security services including authentication and non-repudiation.Encryption can be used to transform the plaintext message into unreadable format with the support of a key, again the message transform back to original message by using the decryption procedure.In this process, each user ... Read More

What is Public-Key Cryptosystem in Information Security?

Ginni
Updated on 15-Mar-2022 11:57:24

741 Views

A public-key cryptosystem is that the messages is encrypted with one key and can only be decrypted with a second key, etc. A strong public-key system is one in which control of both the algorithm and the one key provides no beneficial information about the other key and thus no indication as to how to decrypt the message.In public key cryptography, it is not applicable to calculate private key using the available public key in the network. Because of this reason public key can be completely available in the network.If a user encrypts a message with the public key of ... Read More

What is Discrete Logarithmic Problem in Information Security?

Ginni
Updated on 15-Mar-2022 11:55:01

3K+ Views

Let G be a finite cyclic set with n elements. It consider that the group is written multiplicatively. Let b be a generator of G and thus each element g of G can be written in the form g = bk for some integer k.Moreover, any two such integers defining g will be congruent modulo n. It can represent a function logb: G → Zn(where Zn indicates the ring of integers modulo n) by creating to g the congruence class of k modulo n. This function is a group isomorphism known as the discrete algorithm to base b.In mathematics, particularly ... Read More

Advertisements