Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

How does public key cryptography work and how does a digital signature provide authenticity and tamperproofness?

0
Posted

How does public key cryptography work and how does a digital signature provide authenticity and tamperproofness?

0

This is answered by first considering secret key cryptography. Modern day cryptography is based upon secret keys, not secret algorithms. (An algorithm is the recipe or formula. It is the method by which raw ingredients, for example, are converted into a cake. In the case of cryptography, a message is converted into a scrambled message through use of the algorithm.) In the old days, the algorithm was kept secret. Soon, however, the secret would normally get out and suddenly the whole system was useless. All of the algorithm “machines” used to encrypt and decrypt messages, for example, now needed to be replaced with machines that would implement a new, secret algorithm. After WWII, secret key cryptography was invented using mathematics involving large random numbers which are used as keys. Anyone can know the mathematical algorithm which encrypts a message using a key, but without knowing the key no one can decrypt the scrambled message. Since the key is a large number randomly chosen an

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.