Explore chapters and articles related to this topic
Blockchain User, Network and System-Level Attacks and Mitigation
Published in Shaun Aghili, The Auditor's Guide to Blockchain Technology, 2023
Nishtha Baria, Dharmil Parmar, Vidhi Panchal
As discussed in Chapter 2, two keys are needed to encrypt data. One is the public key (available to everyone), and the other is the private key (restricted only to a specific user). Public-key cryptography uses a pair of keys for the encryption process, beginning with the encryption of the data with the help of the public key, after which the encrypted data can only be decrypted with the help of the private key. Private-key cryptography works the other way around, by encrypting the information using the private key and decrypting the data using the public key. In the event of a key’s compromise or theft, there is an increased likelihood that the user’s blockchain account will also be compromised, thereby facilitating unauthorized transactions from the compromised account [16].
Key Management and the Public-Key Revolution
Published in Jonathan Katz, Yehuda Lindell, Introduction to Modern Cryptography, 2020
We conclude by summarizing how public-key cryptography addresses the limitations of the private-key setting discussed in Section 11.1: Public-key cryptography allows key distribution to be done over public (but authenticated) channels. This can simplify the distribution and updating of shared, secret keys.Public-key cryptography reduces the need for users to store many secret keys. Consider again the setting of a large corporation where each pair of employees needs the ability to communicate securely. Using public-key cryptography, it suffices for each employee to store just a single private key (their own) and the public keys of all other employees. Importantly, these latter keys do not need to be kept secret; they could even be stored in some central (public) repository.Finally, public-key cryptography is (more) suitable for open environments where parties who have never previously interacted want the ability to communicate securely. As one commonplace example, a company can post its public key on-line; a user making a purchase can obtain the company’s public key, as needed, when they need to encrypt their credit-card information to send to that company.
Miscellaneous
Published in Dan Zwillinger, CRC Standard Mathematical Tables and Formulas, 2018
Suppose Alice wants to send a message (the plaintext) M to Bob. Using a key Alice encrypts M to create the ciphertext E, and sends E to Bob. Bob converts E back to M, also using a key. The goal is to make it difficult to convert E to M if some information is unknown. Common cipher classes include:Secret key cryptography uses one key for encryption and decryption. Examples include:Data Encryption Standard (DES) is a block-cipher that is out of use. Triple-DES with 168‐bit keys is currently used.Advanced Encryption Standard (AES) uses a block-cipher with 128-bit keys and blocks.Public key cryptography uses one key for encryption and another key for decryption. These depend upon one-way functions; mathematical functions that are easy to compute but difficult to invert. (The existence of one-way functions has never been proven. If P = NP, then they do not exist.)
An Improved 2-Factor Authentication Scheme for WSN Based on ECC
Published in IETE Technical Review, 2023
Bhanu Chander, Gopalakrishnan Kumaravelan
Elliptic Curve Cryptography (ECC) is a special kind of public-key cryptography built on mathematically programmed elliptic curves that require smaller key sizes. Thus, it could be an appropriate target for resource-constrained situations. Famous well-known researchers Victor Miller projected ECC in 1885, then Neal Koblitz in 1985. An elliptic curve over a finite field demarcated as the set of every (x, y) ∈ Fp × Fp such that = + ax + b, here a, b ∈ Fp and mod p ≠ 0, and a prominent point at infinity which O. symbolizes. It should assume that the Gateway node is more computationally efficient than sensor nodes and holds a secured database where the list of registered sensor nodes is stored. In addition, every sensor node and Gateway node hoard their corresponding individualities in memory formerly than network placement.
A novel out-of-band biometrics authentication scheme for wearable devices
Published in International Journal of Computers and Applications, 2020
Manmeet Mahinderjit Singh, Ke Wan Ching, Asrulnizam Abd Manaf
Asymmetric cryptography or also known as public-key cryptography using two different keys which are public key and private key to encrypt and decrypt the data. In OOB-BA prototype, public-key encryption technology developed by RSA Data Security is applied. The Rivest, Shamir and Adleman (RSA) algorithm is based on the difficulty in factoring very large numbers. Based on this principle, the RSA encryption algorithm uses prime factorization as the trap door for encryption. Besides that, with an RSA key length of 1024 bit, it is difficult to be cracked or brute forced in a finite time. Hence, it is used to encrypt the hashing form password in order to enhance the security of the password.
Rain Drop Service and Biometric Verification Based Blockchain Technology for Securing the Bank Transactions from Cyber Crimes Using Weighted Fair Blockchain (WFB) Algorithm
Published in Cybernetics and Systems, 2023
Open source software and programming language Python are used to experiment the transactions through Blockchain technology. The bitcoin is a cryptocurrency and is used to change digital assets online. Bitcoin makes use of cryptographic proof as opposed to third-party trust to execute transactions over the internet between two parties. Each transaction is protected via digital signature. Public-key cryptography, or asymmetrical cryptography, is any cryptographic system that uses pairs of keys: public keys which can be disseminated extensively and private keys which might be recognized only by the owner.