•Define public-key cryptosystem.
•In your own opinion, why do you think it is important to utilize public-key cryptosystem?
•How is it different from symmetric key algorithms?
•What are the 5 main requirements that a public-key cryptosystem must fulfill to be a secured algorithm?
This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.The main distinction between symmetric and asymmetric cryptography can be found in the textbook at page 256. The highlighted difference contributes on retrieving the definition of a public-key cryptosystem. Any cryptosystem based on public-key uses two distinct keys: one public (for encryption) and one private (for decryption). Although the two keys are distinct, they are related in a way that ensures the cryptosystem is valid (practically the encryption cannot be performed without knowing the public key, which is accessible to anyone, while the decryption key is the only way to recover the plaintext from the ciphertext – the secret key is not accessible to anyone and it is known only by the receiver of the message)....