answersLogoWhite

0


Best Answer

To help people find the weakness of the algorithm

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Why should the encryption algorithm be made public?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What is scalable encryption algorithm?

this algorithm is initially made for small embedded applications like smart cards


How do you decrypt a data file to that has been encrypted with the users public key?

When you reference a "public key" you are implying that the file has been encrypted using "asymmetric cryptography". In asymmetric cryptography, encryption and decryption depend on a key PAIR. The user retains their private key and publishes their public key. Anyone can encrypt a file using the user's public key and send it to them. The only person who should be able to decrypt a file encrypted with that public key is the holder of the private key - which, unless the user has made the mistake of sharing their private key - means that only the original user can decrypt the messages sent to them. Most of the asymmetric encryption algorithms use pretty much the same method to decrypt that was used to encrypt, but use the "other" key from the key pair. Messages encrypted using the private key can only be decrypted using the public key - which provides some authentication that the message indeed came from the holder of the private key. Messages encrypted using the public key can only be decrypted by the holder of the private key, so messages sent to them should be secure.


Can you suggest free encryption softwares?

hi,^^Nothing good to be free. I'm using encryption shield in my office and laptop. Sometimes,when I'm on business trip,I'll bring my laptop with me. And there are times my laptop would be exposured in public area, if laptop was stolen or accessed by bad people,it would be hardly assured my important and confidential information files be read and made good use of.So that's why i spent $34.95 purchasing encryption shield.Comparing to my data's security and value, i definitely ensure my money has been paid at the right place. You can find the link of the software on my bio page.


What do you call a program or group of programs that is created by a community of developers and is made available to the public for free?

Freeware - or shareware.


What is a VPN Network?

A VPN network is basically a Virtual Private Network and it works like as if a remote user is connected to a remote private work. And the connection is made through a secured channel using some sort of encryption method. A VPN gives you a secure data transfer protection and many other benefits.

Related questions

What is scalable encryption algorithm?

this algorithm is initially made for small embedded applications like smart cards


Which encryption algorithm is better and why?

If you're talking about symmetric key encryption (the kind where you just use one key for encryption and decryption), then arguably, the best encryption algorithm you can use is the Rijndael algorithm, better known now as AES (advanced encryption standard). It is the encryption standard used by the U.S. government for classified information. It is fast, requires little memory, and the only potential attacks against it are highly theoretical. Rijndael beat out Twofish and Serpent in the AES standard contest, but those other two algorithms will provide more than enough security as well. In the end, it doesn't really matter, since most successful attacks are made simply by finding out your key through brute force, espionage or extortion, rather than pure data analysis. Humans are almost always the weakest point when it comes to security, and it doesn't matter what algorithm you use if someone can guess your password.


My friend made a bet with me that I couldn't break his custom encryption or something. I really have no idea what Im doing with this. Any help?

Whether one particular encryption algorithm can be broken with ease or only with a huge effort depends on the strength of the cipher. A simple encryption algorithm such as ROT-x or XOR-n are not very hard to break, however, present-day industry-standard encryption algorithms such as many forms of AES are very hard to break. Those simple algorithms are broken by application of logic and observation; one example are common picture puzzles where shapes are used to represent different digits, and combinations of shapes represent different mathematical equations. No encryption algorithm has been proven to be unbreakable, but some have been proven to be virtually impossible to break by brute force. Brute force attacks are done by trying out huge numbers of keys, for example. The impossibility to break a cipher in this manner is deducted from statistic probabilities about the number of attempts one would need to make in order to find the correct key. However, some particular algorithms have known weaknesses which can be exploited. For example, a weak algorithm might produce the same output from the same input every time, or produce different output with predictable differences. Many encryption schemes are also exploited by taking advantage of human weakness, such as trying out a list of well-known passwords, etc. Other methods of breaking an encryption scheme involve a known plaintext content: knowing the data, or part of the data, which ought to be within the encrypted data, can allow for conclusions about the encryption algorithm. In WWII, the German Enigma encryption engine was famously broken based on such knowledge. Therefore, an important step about an encryption code is to collect as much information about the code, its application, and its inventor, as possible. These will often give clues about the nature of the algorithm, or about particular limitations, which would then lead to planning the next steps.


What is difference between secret key and public key encryption?

It depends on how you apply the term "secret key encryption". In one sense "Secret key encryption" refers to using symmetric keys - both parties have the key and must keep it secret in order to protect the confidentiality of the communication. Usually the process that was used to encrypt the original message can be decrypted by repeating the encryption process with the original secret key. This should provide for confidentiality, non-repudiation, and validation since only the holders of the shared secret key should be able to successfully encrypt and decrypt the messages. In contrast to the symmetric key encryption, Public Key encryption uses two keys in the encryption/decryption process. Anything encrypted with one key can be decrypted with the other key. The "public key" is published for everyone to access. The "private key" is kept by the owner and not made available to the world. The encryption of the original message using one key can be "undone" only by using the other key. Using the public key on a message already encrypted with the public key only results in an even more jumbled and unintelligible mess. The end result is that is someone encrypts a message with their private key, only their public key can be used to decrypt it, thus verifying the source of the message. Any message encrypted using the public key can only be decrypted with the private key, thus providing confidentiality. If two users want to use asymmetric encryption to communicate securely, they can do it this way: Alice encrypts a message to Bob using Bob's public key. Only Bob can decrypt it and read it (using his private key). He can then send a return email to Alice using Alice's public key that only Alice can decrypt and read (using her own private key). If they wish, they can use this method to agree upon and exchange a shared symmetric key than can be used for further secure communications. Several automatic secure protocols use exactly this method or a variation of it. The alternate meaning is to make "secret key" synonymous with the "private key" of asymmetric encryption. In this case there is really no difference between secret key and public key encryption except for which key of the public/private key pair is being used and who can read it.


What is the difference between Private key cryptography and public key cryptography?

Public key encryption refers to a type of cypher or code architecture known as public key cryptography that utilizes two keys, or a key pair), to encrypt and decrypt data. One of the two keys is a public key, which anyone can use to encrypt a message for the owner of that key. The encrypted message is sent and the recipient uses his or her private key to decrypt it. This is the basis of public and private key encryption.


How to remove encryption made by win xp with domain and domain no longer exist?

Excude it from the domain in your computer settings and after that encryption will disappear.


What is open SSL?

Open SSL is a Linux based application made to create SSL certificates on your server. Once you have create an SSL, you may either use it as a Self-Signed SSL meaning that the SSL has been assigned by your server or you may purchase an SSL certificate from a known and trusted SSL provider such as verisign to avoid Alert messages such as SSL is not trusted from your browser.


Where can you look for registered firearms?

Such listings are not made available to the general public, nor should they be.


What is address for gm truck vin?

Such records are not made available to the public, nor should they be.


How do you decrypt a data file to that has been encrypted with the users public key?

When you reference a "public key" you are implying that the file has been encrypted using "asymmetric cryptography". In asymmetric cryptography, encryption and decryption depend on a key PAIR. The user retains their private key and publishes their public key. Anyone can encrypt a file using the user's public key and send it to them. The only person who should be able to decrypt a file encrypted with that public key is the holder of the private key - which, unless the user has made the mistake of sharing their private key - means that only the original user can decrypt the messages sent to them. Most of the asymmetric encryption algorithms use pretty much the same method to decrypt that was used to encrypt, but use the "other" key from the key pair. Messages encrypted using the private key can only be decrypted using the public key - which provides some authentication that the message indeed came from the holder of the private key. Messages encrypted using the public key can only be decrypted by the holder of the private key, so messages sent to them should be secure.


Difference between adaptive and non adaptive algorithm?

Non adaptive algorithm requires any changes to be made manually. Adaptive algorithms are able to make any changes automatically.


What is Jedwards number?

Personal information about someone should never be made public on the Internet or in the papers.