July 9, 2011 | Category: Embedded System Design | Tags: Cryptography Data Encryption Security, Cryptography Data Security

**Public key cryptographic system** consists of two separate keys, one to lock or encrypt the plain text, and the other to unlock or decrypt the ciphertext. One of the key is public key and the other is a private key. The lock or encryption key of the **Public Key Cryptographic system** enables private communication from the public to unlocking key’s owner. The unlock or decryption key of the Public Key Cryptographic system serves as a signature verifier of documents locked by the owner of the private key. **Public Key Cryptography** is also called as **Asymmetric Key Cryptography** as it uses Asymmetric key algorithms. *Public Key Cryptography* is mostly used in Key agreement, Data Encryption, and Digital Signatures.

## Features of Public Key Cryptography

- A message encrypted with a recipient public key cannot be encrypted by anyone except a possessor of the matching private key. This assures confidentiality by using public Key Cryptography.
- Example of Public key Cryptography is a locked mailbox with a mailslot.
- Public key cryptography is used in digital signature schemes.
- Digital signatures by public key cryptography are used for sender authentication and non-repudiation.

## Advantages and Drawbacks of Public Key Cryptography

- Advantages of Public Key Cryptography
- A Public key algorithm does not require a secure initial exchange of one or more secret keys between the sender and receiver.
- The use of public key algorithm allows authenticity of a message to be checked by creating a digital signature of the message using the private key, which can be verified using the public key.
- The advantage of Public Key Cryptography is increased security and convenience
- The public key system can be used to encrypt a secret key which is used to encrypt the bulk of a file or message.

- Drawbacks of Public Key Cryptography
- The speed of encryption is less in public key cryptography systems when compared to all other security systems.
- Public key cryptography cannot be used with secret key cryptography systems.
- Public key cryptography may be vulnerable to impersonation.

### Relevant Technical Articles:

**Encryption Algorithms for Cryptographic Network Security in Data Communications & Storage :-**Encryption is for information security in digital data communication and storage networks. Encryption programs use...**Cryptographic Hash Functions – Data Encryption Algorithms :-**Cryptographic Hash function is a complex encryption algorithm used in cryptography and it refers to...**Asymmetric Encryption Algorithms :-**Asymmetric encryption algorithms employ a pair of keys, one is a public key and the...**Symmetric Key Encryption Algorithms :-**Symmetric key encryption uses same key, called secret key, for both encryption and decryption. Users...**Cryptography Projects for Data Encryption Security :-**Cryptography is the security practice of Data Encryption for hiding secret information. Encryption is the...**Transient-Key Cryptography for Digital Signature :-**In order to have a proper and secure communication, it is necessary to use transient...**Symmetric Key Cryptography :-**Symmetric-Key Cryptography consists of a key called symmetric key, with the help of which both...**Cryptography: Encryption & Decryption Algorithms Applications & Advantages :-**Cryptography (or cryptology) is the practice and study of hiding secret information by encryption. Encryption...**Identity-based Cryptography for Secure Digital Signature Authentication :-**Identity Based Cryptography results in an Identity Based signature Scheme resulting in secure and properly...**Multivariate Cryptography & Multiple Encryption Security :-**Multivariate Cryptography is a family of public key cryptosystems. Multivariate cryptography is the generic term...