Content deleted Content added
Added information on modern applications of public-key cryptography, including its role in blockchain, cryptocurrencies, cloud services, and IoT. Also expanded the weaknesses section with details on the quantum threat and the development of post-quantum cryptography. Relevant sources included Tags: Reverted Visual edit Disambiguation links added |
m Undid revision 1305708614 by Sylpharex (talk) WP:LLM filler |
||
Line 186:
[[Non-repudiation]] systems use digital signatures to ensure that one party cannot successfully dispute its authorship of a document or communication.
Further applications built on this foundation include: [[digital cash]], [[password-authenticated key agreement]], [[Trusted timestamping|time-stamping services]] and non-repudiation protocols
== Hybrid cryptosystems ==
Line 194:
As with all security-related systems, there are various potential weaknesses in public-key cryptography. Aside from poor choice of an asymmetric key algorithm (there are few that are widely regarded as satisfactory) or too short a key length, the chief security risk is that the private key of a pair becomes known. All security of messages, authentication, etc., will then be lost.
Additionally, with the advent of [[quantum computing]], many asymmetric key algorithms are considered vulnerable to attacks, and new quantum-resistant schemes are being developed to overcome the problem.<ref>{{Cite journal |last1=Escribano Pablos |first1=José Ignacio |last2=González Vasco |first2=María Isabel |date=April 2023 |title=Secure post-quantum group key exchange: Implementing a solution based on Kyber |url=https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/cmu2.12561 |journal=IET Communications |language=en |volume=17 |issue=6 |pages=758–773 |doi=10.1049/cmu2.12561 |hdl=10016/37141 |s2cid=255650398 |issn=1751-8628|hdl-access=free }}</ref><ref>{{Citation |last1=Stohrer |first1=Christian |title=Asymmetric Encryption |date=2023 |work=Trends in Data Protection and Encryption Technologies |pages=11–14 |editor-last=Mulder |editor-first=Valentin |place=Cham |publisher=Springer Nature Switzerland |language=en |doi=10.1007/978-3-031-33386-6_3 |isbn=978-3-031-33386-6 |last2=Lugrin |first2=Thomas |editor2-last=Mermoud |editor2-first=Alain |editor3-last=Lenders |editor3-first=Vincent |editor4-last=Tellenbach |editor4-first=Bernhard|doi-access=free }}</ref>
=== Algorithms ===
|