Requirement Of Cryptography


4.0 Requirement of public key cryptography

The requirement of public key cryptography is listed below:
>> It is computationally easy for party B to generate a pair of keys  that is :
       (Public key & Private key)
>> It is computationally easy for a sender A must know the public key and 
     encrypt the message M, to generate the cipher text. 
C = Ekub(M)
>> It is computationally easy for receiver B to decrypt the cipher  text using
      it’s  PRIVATE KEY.
M=Dkrb (C) = Dkrb[Ekub(M)]
>> It is computationally infeasible for an opponent , knowing the public key KUb,
      to determine the private key KRb
>> It is computationally infeasible for an opponent , knowing the public key KUb,
     and  cipher text to recover the original message M.
>> The encryption and decryption function can be applied in either order.
M = Ekub [Dkrb(M)] = Dkub[Ekrb(M)]