Public key Cryptography
Public key Cryptography
Information Security
(4360702)
Unit - 3 Public Key Cryptography
1
✅
pre-shared secret keys.
Authentication – Verifies sender identity using digital
✅
signatures.
Scalability – Works well for large networks, as each user
only needs one public-private key pair.
❌
computationally intensive.
Key Management Complexity – Requires a robust Public
❌
Key Infrastructure (PKI) to manage keys securely.
Not Ideal for Encrypting Large Data – Often used to
securely exchange symmetric encryption keys instead.
🔹
HTTPS connections.
Email Encryption (PGP, S/MIME) – Protects email
🔹
confidentiality.
Digital Signatures – Used in electronic documents,
contracts, and software signing.
5
🔹
public-private key pairs for secure transactions.
VPN & Secure Network Communications – Helps establish
encrypted tunnels for safe data transfer.
Conclusion
6