176
◾
Linux with Operating System Concepts
There are two general forms of encryption algorithms used today:
symmetric key encryp-
tion
(also known as
private
key encryption) and
asymmetric key encryption
(also known
as
public
key encryption). The
key
is a mathematical means of encrypting and decrypt-
ing information. The encryption algorithms used today apply
a numeric key that might
be 80, 128, or 256 bits in length. Various algorithms use different sized keys and apply
them in different ways. Symmetric key encryption algorithms include advanced encryp-
tion standard (AES), the data encryption standard (DES, now out of date), and the triple
data encryption algorithm (triple DEA which applies DES in three ways). Asymmetric key
encryption algorithms include RSA (abbreviations of the three inventors, Ron Rivest, Adi
Shamir, and Leonard Adleman), ElGamal, and the digital signature algorithm (DSA).
Figure 5.8 illustrates the use of symmetric key encryption (top half of the figure) and
asymmetric key encryption (bottom half of the figure).
In symmetric key encryption, there
is a single key that handles both encryption and decryption. Since this key is the only pro-
tection to ensure the security of the encrypted data, it is known as a
private
key, one that
should be held securely so that the data cannot be examined.
You might use symmetric
key encryption to encrypt your data files on your computer or to transmit data to another
person over the Internet who knows the key.
For E-commerce, we need a mechanism, whereby a customer can encode confidential
data such as a credit card number and submit that information over the Internet. The
concern here is that if we were to use symmetric key encryption,
then we would be giving
the key to the customer who could potentially then use that key to decrypt other people’s
messages. So, a separate mechanism is needed, one where we have a public key that can
be given to anyone and a private key. In asymmetric key encryption, the
public
key is used
to encrypt messages but cannot be used to decrypt messages. The private key is used to
decrypt messages as well as generate the public key. Therefore,
the organization creates a
private key and uses it to generate a public key. The private key is kept secure and the public
key is provided to the customers.
You have no doubt used asymmetric, or public key, encryption yourself although you
may be unaware of any of the actual mechanisms behind it because these are taken care of
by your web browser. You can view the public key provided to you by an organization by
12345678901234567
Original message
Key
Key
Encrypted message
Original message
12345678901234567
#A1c8eF!7ab8zzeiZ2*Mp3
12345678901234567
Original message
Encrypted message
Public key
Private key
Original message
12345678901234567
F8&cc%75ona!rheVb
FIGURE 5.8
Symmetric (public) key encryption (top) and asymmetric (private)
key encryption
(bottom). (Adapted from Fox, R.
Do'stlaringiz bilan baham: