How "Private" is Private Key?

Chevalier, Gregory J.
March 2006
Security: Solutions for Enterprise Security Leaders;Mar2006, Vol. 43 Issue 3, p52
Trade Publication
The article evaluates the security of the Asymmetrical Public Key Encryption which involves the use of two randomly generated keys. The first key is referred to as the public key which can be seen or known by anyone. It encrypts data for protection and verifies an electronic signature generated by its owner. The second key is the private key used to decrypt data that has been encrypted with the matching public key.


Related Articles

  • Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes. Jia Yu; Fanyu Kong; Xiangguo Cheng; Rong Hao; Yangkui Chen; Xuliang Li; Guowen Li // Journal of Networks;Jun2010, Vol. 5 Issue 6, p634 

    Forward-secure signatures are proposed to tackle the key exposure problem, in which the security of all signatures prior to key leakage is still kept even if the secret key leaks. In this paper, we construct two forward-secure multisignature schemes, one forward-secure threshold signature...

  • Secret Codes Meet Security Pros. Emigh, Jacqueline // Government Security;Apr2005, Vol. 4 Issue 3, p32 

    Focuses on the use of encryption in computer security. Use of software-based mathematical formulas that scramble information to hide it from unauthorized individuals; Cryptography systems.

  • Lock and load. Coffee, Peter // eWeek;1/16/2006, Vol. 23 Issue 3, p46 

    The article focuses on developing integrated security systems. The author in this article views that the invention of the lock and key is of great relevance to the computer industry. According to him, locks and keys are great examples of simplicity and effectiveness. One can choose to use a more...

  • Threshold attribute based universal designated verifier signature scheme in the standard model. Feng Cai; Wangmei Guo; Ximeng Liu // WSEAS Transactions on Communications;2014, Vol. 13, p329 

    In universal designated verifier signature scheme, signature holder can designate the signature to any desired designated verifier. Only the designated verifier can believe that the signature holder does have a valid publicly verifiable signature. Attribute based encryption is a novel public key...

  • Cryptanalysis and Improvement on a Threshold Proxy Signature Scheme. ZUO-WEN TAN; ZHUO-JUN LIU // Journal of Information Science & Engineering;Mar2009, Vol. 25 Issue 2, p619 

    In a (t, n) threshold proxy signature scheme, an original signer can delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can cooperatively sign messages on behalf of the original signer, but t - 1 or fewer proxy signers cannot generate a valid...

  • AN ENHANCED AND SECURE PROTOCOL FOR AUTHENTICATED KEY EXCHANGE. Prasad, M. V. Siva; Babu, A. Vinaya; G. Satyanarayana // Journal of Theoretical & Applied Information Technology;9/12008, Vol. 4 Issue 9, p882 

    An enhanced authentication key exchange protocol was proposed to exchange multiple session keys between two participants at a time. This paper shows that this enhanced protocol is insecure under the known session key attack, known long-term private key attack, signature forgery attack, and...

  • Methods of Generating Key Sequences Based on Parameters of Handwritten Passwords and Signatures. Lozhnikov, Pavel; Sulavko, Alexey; Eremenko, Alexander; Volkov, Danil // Information (2078-2489);Dec2016, Vol. 7 Issue 4, p1 

    The modern encryption methods are reliable if strong keys (passwords) are used, but the human factor issue cannot be solved by cryptographic methods. The best variant is binding all authenticators (passwords, encryption keys, and others) to the identities. When a user is authenticated by...

  • Waging crypto wars 2.0. Antonopoulos, Andreas // Network World;10/11/2010, Vol. 27 Issue 19, p19 

    The article shares the author opinion on the disadvantages of backdoor-free encryption into the security systems in the U.S.

  • It's been a tough summer for data security. Dipert, Brian // EDN;10/11/2001, Vol. 46 Issue 23, p26 

    Focuses on the management of data security in the United States. Considerations on the successful encryption of four audio-water-marking proposals at the Secure Digital; Defeat against the wired-equivalent-privacy security algorithm; Details on the encryption on electronic-book-security scheme...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics