Le a r t e x t c ip h e r t e x t bob a lic e secure

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: P u b lic Key A lic e 's P r iv a te K e y E n c r y p tio n C le a r T e x t D e c r y p tio n C le a r T e x t C ip h e r T e x t Bob A lic e Secure Hash Function Secure M essag D ig e s t Key C le a r Text Hash F u n c tio n O r ig in a l C le a r Text O r ig in a l M essage D ig e s t Bob O r ig in a l C le a r Text NonS e c u re N e tw o rk O r ig in a l M essage D ig e s t Key C o m p u te d M essag D ig e s t Hash F u n c tio n C o m p a re ? A lic e Digital Signature Digital A lic e 's P r iv a te K e y A lic e 's P u b lic K e y E n c r y p tio n C le a r T e x t C ip h e r T e x t A lic e D e c r y p tio n & A u th e n tic a tio n Bob C le a r T e x t Certificate Authority Certificate R e q u e s t B o b 's P u b lic K e y C e r tific a te A u th o rity P u b lis h P u b lic Key B o b 's P u b lic Key A lic e Bob C ip h e r T e x t Public Key Certificates • An important element of IPSec key management is the use of public key certificates • A public key certificate is provided by a trusted Certificate Authority (CA) to authenticate a user's public key • The essential steps include… Public Key Certificates • Step 1 – Client software creates a pair of keys, one public and one private – The client prepar...
View Full Document

This note was uploaded on 06/03/2013 for the course IS e.g.101 taught by Professor Dr.mahmoudmostafa during the Fall '12 term at Ain Shams University.

Ask a homework question - tutors are online