answersLogoWhite

0


Best Answer

The answer is actually in the question.

First, you need to understand what happens with public key cryptography (asynchronous). In essence you use public keys to initiate a secure channel, by which to pass a "single" or more properly stated, synchronous key. The operation to encrypt with the large asynchronous key is very expensive (from a computation time perspective), so you only use that to encrypt the synchronous key, then you encrypt the actual data with this synchronous key.

The reason that synchronous keys are shorter is because (if you are being secure) the synchronous keys are transfered in a secure manner. For example, either by passing it to someone in person, or over a channel that is secure.

An asynchronous key is not transfered via a secure method, it is transfered in the clear. To really understand how this all works, you need to look into a Diffie Hellman key exchange. A public key is really just a really big Prime number put through some sort of algorithm. If we use multiplication as an example we can say, you take one huge prime number and multiply it by another huge prime number. This operation is easy to do, but very hard to undo without one of the numbers. The magic of how to get to secret numbers by transferring (in the clear) non secret numbers is what Diffie Hellman key exchange is all about.

So I guess the short and sweet answer to your question is:

Asynchronous keys are longer then synchronous keys because synchronous keys are only meant to be transfered via a secure channel. Asynchronous keys are transfered via insecure channels and must be longer to get an appropriately sized number to prevent factorization.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Why public key criptography requires longer keys than single key cryptography?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What are the types of cryptography?

public key cryptography private key cryptography


What are different cryptography algorithms?

There are two types of cryptography algorithms: 1) Public key cryptography 2) Secret key cryptography


What are the Various synonyms for public key cryptography?

Public key cryptography is also known as assymteric key cryptography. It uses RSA algorithm ans is mainly for authentication.


What the the different types of cryptography?

There are 2 types of cryptography such as: 1- Symmetric-key or Secret key Cryptography 2- Asymmetric-key or Public key Cryptography


What are the different types of cryptography?

There are 2 types of cryptography such as: 1- Symmetric-key or Secret key Cryptography 2- Asymmetric-key or Public key Cryptography


Private key encryption safer than public key?

No, Public key cryptography is safer than Private key Cryptography. In public key cryptography only only one part of key is visible to others.


The combination of a public key and a private key is known as a?

This is known as RSA encryption. Encryption involving a public and private key combination is known as asynchronous cryptography, as opposed to synchronous cryptography. It is also known as public key cryptography. RSA is an algorithm that may be used (but there are others that can be used), in public key cryptography. (A key pair)


What has the author Ben-Zion Chor written?

Ben-Zion Chor has written: 'Two issues in public key cryptography' -- subject(s): Public key cryptography, Security measures, Telecommunication


What are characteristics of public key cryptography?

If data is encrypted with public key, only private key can decrypt it. AGN


What is the best public-key cryptography algorithm and why?

RSA (Rivest, Shamir, and Adelman) is the best public key algorithm.


18 What system encryption uses the concept of an asymmetric key?

This is known as public-key cryptography, or asymmetric cryptography which is used to secure electronic communication over a network.


What is the flexibility of public key cryptography?

The flexibility of public key cryptography is in the fact that the key has two parts one is public and other is kept secret. That is encryption is done using public key while decryption is done using secret key. Thus message cannot be decrypted by unwanted person.