Public and private key cryptography

Tags: , , , , Categories: Cyberspace

Public and private keys cryptographic algorithms can be deployed to their best if used for an authentic transaction of information (with a certain level of probability of coarse).  Nothing can be communicated “privately” or “secretly” as the very act of confiding the information to the machines doing these encryptions put those machines and systems in control to play as the man-in-the-middle.

So, unless, the machines encrypting the messages or saving those encrypted informations are absolutely isolated, no exchange of information can be considered as a private, secure or anonymous point-to-point.

Its a nice technology to create a barrier of time, but it essentially imposes at the same time that the expiry of the importance of information being encrypted should be lesser than the time required to break it. Since the time to break the encryptions is reducing with the evolution of computing power, the distributed computing and the statistical analysis of the encrypted information, its becoming useless to encrypt information.

I think, its more interesting to use these technologies for the authentication of source or information, but using a TLS/SSL certificate and moving onto HTTPS instead of more open protocol HTTP is yet another debate.

Posted 1 year ago on · Permalink