Message Message Message K E K a Using symmetric encryption Compare D H H H H H

Message message message k e k a using symmetric

This preview shows page 17 - 29 out of 33 pages.

Message Message Message K E K (a) Using symmetric encryption Compare D H H H H H Message Message Message PR a E PU a (b) Using public-key encryption Compare D Message Message Message (c) Using secret value Compare K K K K Source A Destination B Figure 2.5 Message Authentication Using a One-Way Hash Function. H
Image of page 17
Hash Function Requirements
Image of page 18
Security of Hash Functions
Image of page 19
Public-Key Encryption Structure
Image of page 20
Plaintext Readable message or data that is fed into the algorithm as input Encryption algorithm Performs transformations on the plaintext Public and private key Pair of keys, one for encryption, one for decryption Ciphertext Scrambled message produced as output Decryption key Produces the original plaintext
Image of page 21
User encrypts data using his or her own private key Anyone who knows the corresponding public key will be able to decrypt the message Mike Bob Plaintext input Transmitted ciphertext Plaintext output Encryption algorithm (e.g., RSA) Decryption algorithm Bob's private key Bob's public key Alice's public key ring Joy Ted (b) Encryption with private key X PU b PR b Y = E[ PR b , X ] X = D[ PU b , Y ] Figure2.6 Public-Key Cryptography Bob Alice
Image of page 22
Algorithm Digital Signature Symmetric Key Distribution Encryption of Secret Keys RSA Yes Yes Yes Diffie-Hellman No Yes No DSS Yes No No Elliptic Curve Yes Yes Yes Table 2.3 Applications for Public-Key Cryptosystems
Image of page 23
Requirements for Public-Key Cryptosystems
Image of page 24
Asymmetric Encryption Algorithms
Image of page 25
Digital Signatures Used for authenticating both source and data integrity Created by encrypting hash code with private key Does not provide confidentiality Even in the case of complete encryption Message is safe from alteration but not eavesdropping
Image of page 26
Unsigned certificate: contains user ID, user's public key, as well as information concerning the CA Signed certificate Recipient can verify signature by comparing hash code values Figure 2.7 Public-Key Certificate Use Generate hash code of unsigned certificate Encrypt hash code with CA's private key to form signature H H Bob's ID information CA information Bob's public key E D Decrypt signature with CA's public key to recover hash code Use certificate to verify Bob's public key Create signed digital certificate
Image of page 27
Digital Envelop es Protects a message without needing to first arrange for sender and receiver to have the same
Image of page 28
Image of page 29

You've reached the end of your free preview.

Want to read all 33 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture