answersLogoWhite

0


Best Answer

The security of asymmetric cryptography depends on the difficulty - of determining the private key given the public key. For example: an asymmetric encryption algorithm might rely on the difficulty of factoring a very large number into two prime factors. If the cost of computational power and time to perform the factoring exceeds the value of the encrypted information, then the encryption would be considered sufficiently secure for practical purposes. An asymmetric encryption algorithm may also rely on the difficulty of computing discrete logarithms. Both the "factoring products of primes" and "calculating discrete logarithms" approaches to recovering the "private" key of an asymmetric encryption are assumed to rely on the difficulty of brute force attacks. Sometimes algorithms are improperly implemented, the keys are too short, or an inherent weakness is found that allows faster recovery of the key by restricting the key space that must be searched. In these cases, the security of the asymmetric encryption may be significantly less than would be otherwise assumed - i.e. it may be possible to break the encryption fast enough to make it worth the effort.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What the security of public key asymetric cryptography is based upon?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What are the principles of quantum cryptography?

Cryptography using quantum systems, which enable two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages, but not as a form of encryption itself. The nature of quantum cryptography is such that any attempt by eavesdroppers to ascertain the key will alert the authenticated participants of the Quantum Key Distribution scheme.


What is the architecture which DTS security is based?

Public Key Infrastructure certificatesPublic key infrastructure certificates (PKI)


Why are prime numbers more useful than composite numbers in cryptography?

This question is based on a misunderstanding. Most cryptography is based on numbers that are products of two very large prime numbers. Being the product of two primes means that these numbers are composite - not prime!


Where is Ademco Security Group based?

The Ademco Security Group is a sister company of Honeywell Security Group. The Honeywell Security Group is based out of Melville, New York, and was founded in 1929.


Cryptography and network security?

Cryptography and network security are two intertwined realms that form the backbone of a secure digital environment. They provide the necessary tools and frameworks to protect sensitive data, ensuring that individuals and organizations can trust the digital infrastructure they interact with daily. Cryptography is the science of disguising information by transforming it into an unintelligible format—often referred to as ciphertext—such that only authorized parties can revert it back to its original, readable form—known as plaintext. Over millennia, cryptography has evolved from simple ciphers used in ancient times to a sophisticated discipline that relies on complex mathematical algorithms. In modern-day digital communication, cryptography serves multiple purposes. Firstly, it guarantees confidentiality by ensuring that unauthorized parties cannot access sensitive information. Secondly, it ensures the integrity of data by providing mechanisms to detect any unauthorized alterations. Lastly, cryptography can authenticate the identities of the communicating parties, guaranteeing that the individuals or systems at both ends of a communication are indeed who they claim to be. In the realm of cryptography, symmetric-key cryptography and asymmetric-key cryptography are the two main categories. Symmetric-key cryptography uses the same key for both encryption and decryption processes, which necessitates a secure method to share the key among parties. On the other hand, asymmetric-key cryptography employs two keys: a public key, which can be shared openly, and a private key, which remains secret. The RSA algorithm, a widely-used asymmetric cryptographic algorithm, facilitates secure data transmission and is a foundation for many secure communication protocols. Hash functions, another critical aspect of cryptography, generate a fixed-size string of characters from input data of any size. They are fundamental for verifying data integrity. Digital signatures, derived from cryptographic hash functions, allow parties to verify the authenticity and integrity of digital messages or documents. Network security, on the other hand, encompasses a myriad of measures to safeguard a network from unauthorized access, misuse, malfunction, destruction, or improper disclosure. It ensures the continuous availability of the network and its resources. Firewalls, a fundamental component of network security, monitor and control the network traffic based on predefined security rules, acting as a barrier between trusted and untrusted networks. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) monitor network activities for malicious or suspicious actions, providing the necessary alerts or actions to mitigate such activities. Virtual Private Networks (VPNs) establish secure connections between remote networks or users and a private network, ensuring secure communication channels over the internet. Access control mechanisms within network security ensure that only authorized individuals or systems can access certain network resources. Besides, malware protection tools and software provide a defense against malicious software such as viruses, worms, and trojans, which pose significant threats to network security. Furthermore, security policies and procedures provide a framework within which an organization identifies, manages, and reduces its risks, establishing a secure organizational environment. Network monitoring and analytics play a pivotal role in identifying potential security threats and managing network performance, ensuring a robust and reliable network infrastructure.


What is an embedding degree?

In the context of Algebraic Geometry and Cryptography, the embedding degree is a value associated with an algebraic curve, more precisely with a cyclic subgroup of the abelian group associated with the curve.Given an elliptic curve (or an hyperelliptic curve), we can consider its associated abelian group - in the case of an elliptic curve corresponds to the set of points - and a cyclic subgroup G, typically its largest.Using pairings (more notably, the Tate pairing or Weil pairing), we can map G to a subgroup of a finite field.More precisely, if the curve was defined over a finite field of size q, G is mapped to a subgroup of a finite field of size qk for some integer k. The smallest such integer k is called the embedding degree.Moreover, if G has size n it satisfies n | qk - 1 (n divides qk - 1).In Cryptography, the embedding degree most notably appears in security constraints for Elliptic Curve Cryptography and in the more recent area of Pairing Based Cryptography. Pairings allow us to "map" problems over elliptic curves to problems over finite fields and vice-versa with the security and efficiency issues of each side.For example, given the known attacks for the Discrete Logarithm Problem over elliptic curves and over finite fields, in Elliptic Curve Cryptography curves with a very small embedding degree (lower than 6, say) are usually avoided. On the other hand, because in Pairing Based Cryptography operations are often done on both groups, curves with too high embedding degrees are avoided.


What server role is used to manage security tokens and security services for a web based network?

Active Directory Federation Services is used to manage security tokens and security services on a Windows Server 2008 Web-based network.


Which open standards based wireless security mode supports government grade security?

WPA2


GSM Based Security System Project as my Final Year Project?

car security system


Where can i fidn pc based video security?

Security Camera World offers a wide variety of PC based video security. They also offer a low price price guarantee. You can find them at http://www.securitycameraworld.com/


Is Social security means based?

That depends on what country you are in


What principle was NATO based on?

Collective Security / Defense