25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Encryption <strong>and</strong> decryption: Cryptographic algorithms<br />

Encryption is the transformation of a cleartext message into an unreadable form<br />

in order to hide its meaning. The opposite transformation, which retrieves the<br />

original cleartext, is the decryption. The mathematical function used for<br />

encryption <strong>and</strong> decryption is the cryptographic algorithm or cipher.<br />

The security of a cipher might be based entirely on keeping its functionality a<br />

secret, in which case it is a restricted cipher. There are many drawbacks to<br />

restricted ciphers. It is very difficult to keep an algorithm a secret when it is used<br />

by many people. If it is incorporated in a commercial product, it is only a matter of<br />

time <strong>and</strong> money before it is reverse engineered. For these reasons, the currently<br />

used algorithms are keyed, that is, the encryption <strong>and</strong> decryption makes use of a<br />

parameter, known as the key. The key can be chosen from a set of possible<br />

values, called the keyspace. The keyspace usually is huge, the bigger the better.<br />

The security of these algorithms rely entirely on the key, not on their internal<br />

secrets. In fact, the algorithms themselves are usually public <strong>and</strong> are extensively<br />

analyzed for possible weaknesses. The principle of keyed ciphers is shown in<br />

Figure 22-2.<br />

Note: Do not trust new, unknown, or unpublished algorithms.<br />

cleartext<br />

clea<br />

cle<br />

Cleartext<br />

Secret<br />

Key<br />

Figure 22-2 Keyed encryption <strong>and</strong> decryption<br />

Note: It is common in cryptographic literature to denote the first participant in<br />

a protocol as Alice <strong>and</strong> the second one as Bob. They are the “crypto couple.”<br />

778 <strong>TCP</strong>/<strong>IP</strong> <strong>Tutorial</strong> <strong>and</strong> <strong>Technical</strong> <strong>Overview</strong><br />

cleartext<br />

clea<br />

cle<br />

Encryption Decryption<br />

Ciphertext<br />

Secret<br />

Key<br />

cleartext<br />

clea<br />

cle<br />

Original<br />

cleartext<br />

Alice Bob

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!