Recap of Public-Key Encryption

Let’s have a look at a summary of the chapter.

We'll cover the following

Summary

In this chapter, we investigated public-key encryption. We looked at the general problem of designing a public-key cryptosystem and then studied two public-key cryptosystems in some detail. We also looked at how the properties of public-key cryptosystems are most effectively harnessed in applications.

The main issues we covered were the following:

  • Public-key cryptosystems provide the potential for two entities who do not share a symmetric key to employ cryptography to secure the data they exchange.

  • Public-key encryption requires the use of a trapdoor one-way function.

  • RSA is a well-respected and widely deployed public-key cryptosystem with security based on the belief that factoring in large numbers is difficult.

  • ElGamal is a public-key cryptosystem with security based on the belief that solving the discrete logarithm problem is difficult.

  • Variants of ElGamal based on elliptic curves offer the significant benefit that keys are shorter than in either RSA or basic ElGamal.

  • Public-key cryptosystems are less efficient to operate than most symmetric cryptosystems. As a result, public-key encryption is usually employed in a hybrid encryption process, which exchanges a symmetric key used for bulk data encryption.

The significant advantages to applications made possible by public-key cryptosystems led to a revolution in cryptography in the mid-1970s with a further boom in interest following the development of the Internet in the 1990s. However, the public-key cryptosystems in current use are not secure against an adversary with a quantum computer. As a result, there is considerable interest in developing new post-quantum public-key cryptosystems, and developments in this area can be expected.

Public-key cryptography, to an extent, ‘solves’ the problem of symmetric key establishment. However, it replaces this problem with that of authenticating public keys. None of the advantages of public-key cryptosystems can be fully exploited unless we have some level of assurance that public keys are indeed associated with the entities to which we believe they belong.

Get hands-on with 1200+ tech skills courses.