Eden Kandinsky Security

Loading

Asymmetric Cryptography, Secure Communication

Asymmetric Cryptography, Secure Communication

Public-Key Cryptography

  1. The Public Key: This key is designed to be shared openly. It can be published, distributed, and used by anyone who wants to send you an encrypted message or verify your identity.
  2. The Private Key: This key must be kept secret and secure by the owner. It is the only key capable of decrypting messages sent to the public key or creating a valid digital signature.
  • How it Works: If Party A wants to send a secret message to Party B, Party A uses Party B’s Public Key to encrypt the message.
  • Security Outcome: Only Party B, who holds the corresponding Private Key, can decrypt and read the message. This ensures confidentiality even if the message is intercepted during transit.
  • How it Works: If Party B wants to prove they wrote a document, they use their Private Key to generate a unique digital signature for that document.
  • Security Outcome: Anyone with Party B’s Public Key can verify that the signature is authentic and that the document has not been altered since it was signed. This ensures integrity (the data hasn’t changed) and non-repudiation (only Party B could have signed it).
Public Key Infrastructure (PKI) Framework

  • Auditing and Inventorying every instance of RSA and ECC usage.
  • Developing Hybrid Cryptography blueprints that allow you to use both current and quantum-safe algorithms simultaneously.
  • Integrating and managing the new, larger key sizes associated with PQC families like Lattice-Based Cryptography.

Translate »