18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

294 <strong>B2B</strong> <strong>Integration</strong> — A <strong>Practical</strong> <strong>Guide</strong> <strong>to</strong> <strong>Collaborative</strong> E-<strong>commerce</strong><br />

Secret<br />

Secret<br />

Message Encryption<br />

with<br />

Company A Private Key<br />

Decryption<br />

with<br />

Private Key<br />

Message<br />

Company —J B<br />

Figure 10.2. — Private key encryption<br />

10.6.2. Private key encryption<br />

Private key encryption, also called symmetrical encryption, was the<br />

simplest way the encrypted messages were sent in the earlier times. It<br />

used the same unique code called single key or private key for encrypting<br />

as well as decrypting the messages.<br />

Consider a scenario in which Company A wants <strong>to</strong> send Company B<br />

a secret message (see Figure 10.2). If a single private key is used,<br />

• Company A informs Company B about its private key.<br />

• Company A encrypts the message with its private key and sends the<br />

message across.<br />

• Company B makes use of the private key (sent over earlier) <strong>to</strong><br />

decrypt the message.<br />

This encryption method has several obvious limitations. Firstly,<br />

there has <strong>to</strong> be some secure way by which Company A will initially<br />

communicate the private key <strong>to</strong> Company B. If an outsider gets hold<br />

of this private key, the entire communication will be compromised.<br />

Secondly, Company A becomes completely vulnerable <strong>to</strong> Company B<br />

and if Company B wishes it can use this private key <strong>to</strong> impersonate<br />

Company A. Finally, this method is not suitable for multi-party communication—<br />

for example a <strong>B2B</strong> exchange may be communicating<br />

with hundreds of companies for which it will have <strong>to</strong> distribute the<br />

private key <strong>to</strong> all the companies; and as the number of companies<br />

increases, it can be compromised easily.<br />

The most commonly used private key encryption algorithms are RC2<br />

(40 bit encryption) and RC4 (128 bit encryption). Both of these were<br />

invented by RSA Data Security. 56-bit DES is another algorithm that is<br />

primarily used for unclassified government documents.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!