BestInternetSecurity.net

Information Security Resources

Entries Tagged ‘Asymmetric Encryption’

Public Key Infrastructure: Certificate Authority and Its Role in PKI: An Example

Public Key Infrastructure is also named PKI. What is the role of Certificate Authority in PKI? Before we talk on this, let’s discuss the term “trust”. The operation of Public Key Infrastructure strongly depends on “trust”.  And this is also related to the application of asymmetric cryptography technique. To illustrate this, let’s suppose Bob wants […]

Comments (1)

One-way Hash Algorithm – Why and How

One-way Hash Algorithm In cryptographic application such as digital signature, we usually operate on the message with one-way hash algorithm before we apply the sender’s private key on it. Why? It is because one-way hash algorithm can convert the message of whatever length  into a fixed length code (usually of 128 or 196 bits). In […]

Leave a Comment