25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

cleartext<br />

clea<br />

cle<br />

Cleartext<br />

Alice's<br />

private key<br />

Figure 22-4 Authentication by encrypting with a private key<br />

Going a step further, encrypting with the private key gives non-repudiation, too.<br />

The mere existence of such an encrypted message testifies that the originator<br />

has really sent it, because only he or she could have used the private key to<br />

generate the message. Additionally, if a time stamp is included, the exact date<br />

<strong>and</strong> time can also be proven. There are protocols involving trusted third parties<br />

that prevent the sender from using phony time stamps.<br />

Examples of public key algorithms<br />

Algorithms based on public keys can be used for a variety of purposes. Two<br />

common applications are:<br />

► Encryption (see “RSA public key algorithm” on page 783).<br />

► Generation of shared keys for use with symmetric key algorithms (see<br />

“Diffie-Hellman key exchange” on page 784).<br />

The most popular public key algorithm is the de facto st<strong>and</strong>ard RSA, named after<br />

its three inventors: Ron Rivest, Adi Shamir, <strong>and</strong> Leonard Adleman. The security<br />

of RSA relies on the difficult problem of factoring large numbers. The public <strong>and</strong><br />

private keys are functions of two very large (200 digits or even more) prime<br />

numbers. Given the public key <strong>and</strong> the ciphertext, an attack is successful if it can<br />

factor the product of the two primes. RSA has resisted many years of extensive<br />

attacks. As computing power grows, keeping RSA secure is a matter of<br />

increasing the key length (unlike DES, where the key length is fixed).<br />

782 <strong>TCP</strong>/<strong>IP</strong> <strong>Tutorial</strong> <strong>and</strong> <strong>Technical</strong> <strong>Overview</strong><br />

cleartext<br />

clea<br />

cle<br />

Alices's<br />

public key<br />

Encryption Decryption &<br />

Ciphertext<br />

authentication<br />

cleartext<br />

clea<br />

cle<br />

Original<br />

cleartext<br />

Alice Bob

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!