answersLogoWhite

0


Best Answer

1. It is computationally easy for a party B to generate a pair(Public key KUb, Private

key KRb)

2. It is computationally easy for a sender A, knowing the public key and the message

to be encrypted , M, to generate the corresponding ciphertext:

C=EKUb(M)

3. It is computationally easy for the receiver B to decrypt the resulting ciphertext

using the private key to recover the original message :

M=DKRb(C)=DKRb[EKUb(M)]

4. It is computationally infeasible for an opponent , knowing the public key,KUb,to

determine the private key,KRb.

5. It is computationally infeasible for an opponent , knowing the public key,KUb,

and a ciphertext, C, to recover the original message,M.

6. The encryption and decryption functions can be applied in either order:

M=EKUb[DKRb(M)]=DKUb [EKRb(M)]

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What requirement must a public key cryptosystems fulfill to be a secure algorithm?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What are three broad categories of applications of public-key cryptosystems?

Encryption/decryption, Digital signature and Key exchange


Is knapsack algorithm is a public key encryption algorithm?

yes


What is the best public-key cryptography algorithm and why?

RSA (Rivest, Shamir, and Adelman) is the best public key algorithm.


Why should the encryption algorithm be made public?

To help people find the weakness of the algorithm


What requirements must a public key cryptosystems fulfill to be a secure algorithm?

1. It is computationally easy for a party B to generate a pair(Public key KUb, Private key KRb) 2. It is computationally easy for a sender A, knowing the public key and the message to be encrypted , M, to generate the corresponding ciphertext: C=EKUb(M) 3. It is computationally easy for the receiver B to decrypt the resulting ciphertext using the private key to recover the original message : M=DKRb(C)=DKRb[EKUb(M)] 4. It is computationally infeasible for an opponent , knowing the public key,KUb,to determine the private key,KRb. 5. It is computationally infeasible for an opponent , knowing the public key,KUb, and a ciphertext, C, to recover the original message,M. 6. The encryption and decryption functions can be applied in either order: M=EKUb[DKRb(M)]=DKUb [EKRb(M)]


Which encryption algorithm is commonly used as a public key cipher?

Type your answer here... RSA


What is the purpose the reserve requirement?

It protects public deposits.


What are the meeting requirement for the proprietary company?

If by "proprietary company" you are referring to a non-public, non-stock issuing. privately owned business, - - there is no legal requirement that such a company hold public meetings.


What are the difference between DES and RSA algorithm?

DES is a symmetric cryptographic algorithm, while RSA is an asymmetric (or public key) cryptographic algorithm. Encryption and decryption is done with a single key in DES, while you use separate keys (public and private keys) in RSA. DES uses 56-bit keys for encryption while RSA uses 2600-bits of KEY


The requirement of companies to provide full information about their products?

public policy


What is the public announcement requirement for micro-purchases?

No formal annoncement is required.


Objective of public sector accounting?

1.Ensure the essential goods and services are available for everyone equally; 2.Provide the goods and services that are too important for the security of the country; 3.Provide goods and services that cannot be provided by the private sector.