X

KP meaning in Computing ?

( 5 )  .  1 Rating
1803 views   .  0 comments  .   . 

Download Solution PDF

Answer: What is Key Pair mean?

Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys. Each pair consists of a public key (which may be known to others) and a private key (which may not be known by anyone except the owner). The generation of such key pairs depends on cryptographic algorithms which are based on mathematical problems termed one-way functions. Effective security requires keeping the private key private; the public key can be openly distributed without compromising security.

In such a system, any person can encrypt a message using the intended receiver's public key, but that encrypted message can only be decrypted with the receiver's private key. This allows, for instance, a server program to generate a cryptographic key intended for a suitable symmetric-key cryptography, then to use a client's openly-shared public key to encrypt that newly generated symmetric key. The server can then send this encrypted symmetric key over an insecure channel to the client; only the client can decrypt it using the client's private key (which pairs with the public key used by the server to encrypt the message). With the client and server both having the same symmetric key, they can safely use symmetric key encryption (likely much faster) to communicate over otherwise-insecure channels. This scheme has the advantage of not having to manually pre-share symmetric keys (a fundamentally difficult problem) while gaining the higher data throughput advantage of symmetric-key cryptography.

With public-key cryptography, robust authentication is also possible. A sender can combine a message with a private key to create a short digital signature on the message. Anyone with the sender's corresponding public key can combine that message with a claimed digital signature; if the signature matches the message, the origin of the message is verified (i.e., it must have been made by the owner of the corresponding private key).

Public key algorithms are fundamental security primitives in modern cryptosystems, including applications and protocols which offer assurance of the confidentiality, authenticity and non-repudiability of electronic communications and data storage. They underpin numerous Internet standards, such as Transport Layer Security (TLS), S/MIME, PGP, and GPG. Some public key algorithms provide key distribution and secrecy (e.g., Diffie–Hellman key exchange), some provide digital signatures (e.g., Digital Signature Algorithm), and some provide both (e.g., RSA). Compared to symmetric encryption, asymmetric encryption is rather slower than good symmetric encryption, too slow for many purposes. Today's cryptosystems (such as TLS, Secure Shell) use both symmetric encryption and asymmetric encryption, often by using asymmetric encryption to securely exchange a secret key which is then used for symmetric encryption.

reference
Full Form Category
Kinetic Pressure Academic & Science
Kernel Parameter Academic & Science
Kinetic Penguins Academic & Science
Key Production, Inc. Business
Key Personnel Business
Kut Price Business
Kitt Peak Business
Kirby Painting Business
Knight, Order of Pope Pius IX Community
Katy Perry Community
Korean Pride Community
Kiln Park Community
Kennedy Park Community
Kenny Price Community
Katherine Perry Community
Kim Possible Community
Kosher for Passover Community
Killough Platform Computer Hardware
Key Pair Computing
Key Pad Computing
Kamakaze Posse Computing
Korea (North) (People's Republic) General
Kripke Platek General
Kaiser Permanente General
Kenyon Produce General
Kelburn Parade General
Kant Pull General
Knowledge in Practice General
Kumara Parvatha General
King's Pawn General
Kings Place General
Kitchen Portar General
Knowledge Publications General
Knapsack Problem General
Klaas Plantinga General
Kimberley Process General
Kitten Princess General
Kitchen Parametrics General
King Prawn General
Knee Pad General
Kustom Phitted General
Knitting Party General
Keratosis Pilaris General
Katherine Parr General
Kung Pao General
Kosher Passover General
Katy Pikachu General
Kehler And Peters General
Knights of Pythias General
Kapatirang Pilipino General
Kaele Pau General
Karat Plumb General
Krishnamurti Padhati General
Karl Popper General
Kesalan Patharan General
Krysten Patricia General
Kittenprincess Please General
Konserwatiewe Party van Suid-Afrika Governmental
Kowa Party Governmental
Kyoto Protocol Governmental
Kolkata Police Governmental
Kerala Police Governmental
Kenya Police Governmental
KAMPTEE Indian Railway Station
Kein Problem International
Khyber Pukhtoonkhuwa International
Khyber Pakhtunkhwa International
Kaufpreis International
Kommunistische Partei International
KronPrinz (Crown Prince) International
Keine Panik International
Key Programmer Jobs
Kitchen Porter Jobs
Klebsiella pneumonia Medical
Keratitic Precipitate Medical
Kidney and Pancreas Medical
Key Pulse Military and Defence
Kitchen Patrol Military and Defence
Kitchen Police Military and Defence
Knowles and Physics Physics Related
Kinetic Pulse Physics Related
Kunzel-ploog Physics Related
North Korea Regional
Kevin Peter Pietersen Society & Culture
Kernel Panic Softwares
Kicking Prowess Sports
Killer Playas Sports

Take Quiz To Earn Credits!

Turn Your Knowledge into Earnings.




Give Rating
Report
Write Your Comments or Explanations to Help Others
Comments(0)





Miscellaneous in Computing
Miscellaneous in Computing

Ever curious about what that abbreviation stands for? fullforms has got them all listed out for you to explore. Simply,Choose a subject/topic and get started on a self-paced learning journey in a world of fullforms.

Explore Other Libraries

X

Important Computing Links





Copyright (c) 2021 TuteeHUB

OPEN APP
Channel Join Group Join