answersLogoWhite

0

The security of asymmetric cryptography depends on the difficulty - of determining the private key given the public key. For example: an asymmetric encryption algorithm might rely on the difficulty of factoring a very large number into two prime factors. If the cost of computational power and time to perform the factoring exceeds the value of the encrypted information, then the encryption would be considered sufficiently secure for practical purposes. An asymmetric encryption algorithm may also rely on the difficulty of computing discrete logarithms. Both the "factoring products of primes" and "calculating discrete logarithms" approaches to recovering the "private" key of an asymmetric encryption are assumed to rely on the difficulty of brute force attacks. Sometimes algorithms are improperly implemented, the keys are too short, or an inherent weakness is found that allows faster recovery of the key by restricting the key space that must be searched. In these cases, the security of the asymmetric encryption may be significantly less than would be otherwise assumed - i.e. it may be possible to break the encryption fast enough to make it worth the effort.

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

What are the principles of quantum cryptography?

Cryptography using quantum systems, which enable two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages, but not as a form of encryption itself. The nature of quantum cryptography is such that any attempt by eavesdroppers to ascertain the key will alert the authenticated participants of the Quantum Key Distribution scheme.


What is the architecture which DTS security is based?

Public Key Infrastructure certificatesPublic key infrastructure certificates (PKI)


Why are prime numbers more useful than composite numbers in cryptography?

This question is based on a misunderstanding. Most cryptography is based on numbers that are products of two very large prime numbers. Being the product of two primes means that these numbers are composite - not prime!


Where is Ademco Security Group based?

The Ademco Security Group is a sister company of Honeywell Security Group. The Honeywell Security Group is based out of Melville, New York, and was founded in 1929.


Cryptography and network security?

It is a gathering of two or more PC frameworks connected together. There are numerous sorts of PC systems, including the accompanying: neighborhood (LANs): The PCs are topographically near one another. It comprises of the arrangements embraced to forestall and screen approved access, abuse, change of a PC system and system open assets. System security includes the approval of access to information in a system, which is controlled by the system director.


What is an embedding degree?

In the context of Algebraic Geometry and Cryptography, the embedding degree is a value associated with an algebraic curve, more precisely with a cyclic subgroup of the abelian group associated with the curve.Given an elliptic curve (or an hyperelliptic curve), we can consider its associated abelian group - in the case of an elliptic curve corresponds to the set of points - and a cyclic subgroup G, typically its largest.Using pairings (more notably, the Tate pairing or Weil pairing), we can map G to a subgroup of a finite field.More precisely, if the curve was defined over a finite field of size q, G is mapped to a subgroup of a finite field of size qk for some integer k. The smallest such integer k is called the embedding degree.Moreover, if G has size n it satisfies n | qk - 1 (n divides qk - 1).In Cryptography, the embedding degree most notably appears in security constraints for Elliptic Curve Cryptography and in the more recent area of Pairing Based Cryptography. Pairings allow us to "map" problems over elliptic curves to problems over finite fields and vice-versa with the security and efficiency issues of each side.For example, given the known attacks for the Discrete Logarithm Problem over elliptic curves and over finite fields, in Elliptic Curve Cryptography curves with a very small embedding degree (lower than 6, say) are usually avoided. On the other hand, because in Pairing Based Cryptography operations are often done on both groups, curves with too high embedding degrees are avoided.


What server role is used to manage security tokens and security services for a web based network?

Active Directory Federation Services is used to manage security tokens and security services on a Windows Server 2008 Web-based network.


GSM Based Security System Project as my Final Year Project?

car security system


Which open standards based wireless security mode supports government grade security?

WPA2


Where can i fidn pc based video security?

Security Camera World offers a wide variety of PC based video security. They also offer a low price price guarantee. You can find them at http://www.securitycameraworld.com/


Is social security based on the last 5 years of work?

No, Social Security benefits are based on your lifetime earnings, not just the last 5 years of work.


What principle was NATO based on?

Collective Security / Defense