Wednesday, April 10, 2019

Conventional cryptography Essay Example for Free

Conventional cryptography EssayConventional cryptography uses similar secret key in both message encrypting and decrypting. Secret key cryptography often multiplication having difficulty securing key management usually in opens systems with large numbers of users (RSA Lab, n. d. ). Diffie and Hellman initiated the concept of public-key cryptosystems in 1976, to urinate out the problems with key management. (RSA Lab, n. d. ) The newly created concept of public-key cryptosystems employs encryption and digital signatures. The public-key cryptosystem works by providing each someone a pair of keys, a public-key, and a buck private-key. The advantage of using public-key is you can send out sort discipline publicly but it cannot be decrypted. Safely, the recipient that holds the private key is doing the decryption. The form the holds the security information for both sender and receiver is called a enfranchisement. Public-key surety The Public-key cryptosystems principal ingredie nts in realizing its security tasks are 1) Issuer holds the public-key and the unconditional signed private key. It is the basis of the certificate.Issuer can be anyone with a public key and a private key. 2) Subject- contains public key, value, or name. The subject is receiver of the certificate. The particular recipient in this dramatic art has exclusive seriouss to vista the certificate. 3) Delegation- this field contains a Boolean value providing the subject with rights to re-delegate the certificate. If the field is false, the subject may not grant or delegate the certificate to other subject. 4) Authorization- it restricts the subject access rights to a specific information, data, and locations.These rights may be given depending on applications and the level of security required. 5) Validity dates specify the validity period of a certificate by an issuer. It limits the duration of access of the subject. Sample transaction process of public-key cryptosystem. The sample above shows Ka as the issuer, Kb as the subject, True as Boolean value to allow the subject to re-delegate the certificate, Authorization to enunciate tear in . johndocuments, and certificate validity dates from 02/10/2006 to 02/12/2006.John with a Public-key (Ka) issued a certificate to subject Dianne (Kb). The certificate is sign by Johns private key, when Dianne wants to read and write files in Johns document directory, betoken will be written, signs it with his own private key, and send it. When the file server gets the request and found Johns (Ka) signed private key, then the request is granted. The server will now allow Dianne to read and write files in Johns documents directory until the validity date specified in the certificates validity field expires.The delegation occur when the Boolean field is mark True, Kb can now impart its right to other subject. Let us call the new public-key as Kc. Kb re-delegate its certificate to Kc and signs a new certificate for Kc at the sa me time. Kc now has two certificates, which form a chain.References RSA Laboratories, (n. d. ), What is public-key cryptography? online, http//www. rsasecurity. com/rsalabs/node. asp? id=2165 Wang Yulian, 1998, SPKI, Computer Science, Helsinki University, online, http//www. niksula. cs. hut. fi/yuwang/publications/SPKI/SPKI. html

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.