25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

e <strong>and</strong> d are called the public <strong>and</strong> private exponents, respectively. The public key<br />

is the pair (n,e); the private key is d. The factors p <strong>and</strong> q must be kept secret or<br />

destroyed.<br />

A simplified example of RSA encryption is:<br />

1. Suppose Alice wants to send a private message, m, to Bob. Alice creates the<br />

ciphertext c by exponentiating:<br />

c = me mod n<br />

Where e <strong>and</strong> n are Bob's public key.<br />

2. Alice sends c to Bob.<br />

3. To decrypt, Bob exponentiates:<br />

m = c d mod n<br />

And recovers the original message; the relationship between e <strong>and</strong> d ensures<br />

that Bob correctly recovers m. Because only Bob knows d, only Bob can<br />

decrypt the ciphertext.<br />

A simplified example of RSA authentication is:<br />

1. Suppose Alice wants to send a signed message, m, to Bob. Alice creates a<br />

digital signature s by exponentiating:<br />

s = md mod n<br />

Where d <strong>and</strong> n belong to Alice's private key.<br />

2. She sends s <strong>and</strong> m to Bob.<br />

3. To verify the signature, Bob exponentiates <strong>and</strong> checks if the result, compares<br />

to m:<br />

m = s e mod n<br />

Where e <strong>and</strong> n belong to Alice's public key.<br />

Diffie-Hellman key exchange<br />

The Diffie-Hellman key exchange is a crucial component of the ISAKMP/Oakley<br />

framework. In the earliest phase of a key negotiation session, there is no secure<br />

channel in place. The parties derive shared secret keys using the Diffie-Hellman<br />

algorithm. These keys will be used in the next steps of the key negotiation<br />

protocol.<br />

The following steps outline the algorithm:<br />

1. The parties (Alice <strong>and</strong> Bob) share two public values, a modulus m <strong>and</strong> an<br />

integer g. m is a large prime number.<br />

784 <strong>TCP</strong>/<strong>IP</strong> <strong>Tutorial</strong> <strong>and</strong> <strong>Technical</strong> <strong>Overview</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!