RELATIONSHIP BETWEEN CRYPTOGRAPHY AND PKI 2
Running head: RELATIONSHIP BETWEEN CRYPTOGRAPHY AND PKI 1
The relationship between Cryptography and PKI
Student Name
Institution Affiliation
Cryptography is a technology that involves the use of hidden codes and logarithms to secure information from getting to unauthorized people during communication. The technology of cryptography works for both the first party and the second part receiving the message. The first party prepares a message intended to recipients and encrypts it by use of cryptography technology, and it reaches the recipient in the form of a ciphertext message. After receiving the message, the person decrypts the message to get the plain text.
Any other individual who wishes undetected and unapproved access to the message must enter the assurance managed by the cryptographic procedure. For the process to be successful, both parties need to have common information about the important key used to encrypt and decrypt. Public key infrastructure is a form of technology that makes use of cryptography to provide authentication and privacy. Therefore it is important for an organization using cryptography to consider the use of PKI since it will help in promoting secure communication and protection of the assets.
In support of this, cryptography uses two keys to encrypt data, and this process is called asymmetric cryptography. The term keys refer to values that are used to encrypt and decrypt data, and this is where PKI comes in since it uses keys in pairs. One key is private and belongs to the owner while the other key is the public can be given to the second party. When one decrypts a document using another person it is only that person who can decrypt the message because it is the one with a corresponding key to the private key and by following this process PKI provides security. The private key is never to choose or seen by the owner and the longer the key, the better the security. An organization with guaranteed privacy is likely to attract more users due to trust.
For example, PKI can be used in providing security in many organizations. For example, an organization dealing with internet banking is important for it to consider PKI use. In this case, the asset to be secured is the cash banked through the internet. Due to high crimes associated with Cybersecurity, it is difficult to know who is likely to assess the money. But in using PKI, it will provide security keys to the bank and the account holder such that the information is only available to them. The only person who will be authenticated to assess the cash is the owner. PKI has also been used to promote privacy for the users of smart cards.