Public-key cryptography: Difference between revisions

Content deleted Content added
Citation bot (talk | contribs)
Alter: isbn, publisher, pages. Added hdl. Formatted dashes. Upgrade ISBN10 to 13. | Use this bot. Report bugs. | Suggested by Headbomb | Linked from Wikipedia:WikiProject_Academic_Journals/Journals_cited_by_Wikipedia/Sandbox | #UCB_webform_linked 157/205
Too much space
Tags: Reverted Visual edit
Line 74:
|archive-url=https://web.archive.org/web/20220420003617/https://cseweb.ucsd.edu/~mihir/papers/gb.pdf#page=168
|url-status=live
}}</ref><p>For example, a software publisher can create a signature key pair and include the public key in software installed on computers. Later, the publisher can distribute an update to the software signed using the private key, and any computer receiving an update can confirm it is genuine by verifying the signature using the public key. As long as the software publisher keeps the private key secret, even if a forger can distribute malicious updates to computers, they cannot convince the computers that any malicious updates are genuine.</p>
* In a '''public-key encryption''' system, anyone with a public key can encrypt a message, yielding a ''ciphertext'', but only those who know the corresponding private key can decrypt the ciphertext to obtain the original message.<ref name="hac-pke">
{{cite book
Line 254:
 
===Unencrypted metadata===
Most of the available public-key encryption software does not conceal [[metadata]] in the message header, which might include the identities of the sender and recipient, the sending date, subject field, and the software they use etc. Rather, only the body of the message is concealed and can only be decrypted with the private key of the intended recipient. This means that a third party could construct quite a detailed model of participants in a communication network, along with the subjects being discussed, even if the message body itself is hidden.
 
However, there has been a recent demonstration of messaging with encrypted headers, which obscures the identities of the sender and recipient, and significantly reduces the available metadata to a third party.<ref>
Line 264:
|class=cs.CR
|eprint=1411.6409
}}</ref> The concept is based around an open repository containing separately encrypted metadata blocks and encrypted messages. Only the intended recipient is able to decrypt the metadata block, and having done so they can identify and download their messages and decrypt them. Such a messaging system is at present in an experimental phase and not yet deployed. Scaling this method would reveal to the third party only the inbox server being used by the recipient and the timestamp of sending and receiving. The server could be shared by thousands of users, making social network modelling much more challenging.
 
== History ==