18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

10.6.3. Public key encryption<br />

Internet Security 295<br />

To overcome the drawbacks of private key encryption, a new algorithm,<br />

called public key encryption, was invented by Whitfield Diffie and<br />

Martin Hellman in 1976.<br />

Public key encryption or asymmetrical encryption uses two keys:<br />

• One is called the private key, which is held by only one party; and<br />

• The other is called the public key, which is available <strong>to</strong> the outside<br />

world.<br />

These keys complement each other like a mechanical lock and key.<br />

The message is encrypted with the public key and can be unlocked or<br />

decrypted only with the private key. Any company, like Company A,<br />

wishing <strong>to</strong> communicate with Company B can encrypt the message with<br />

Company B's public key and send it across (see Figure 10.3). Thus, the<br />

two companies do not have <strong>to</strong> agree upon a key in advance. Since the<br />

decryption can be done only with the private key, which is known only<br />

<strong>to</strong> Company B, even if the message is intercepted, the intercep<strong>to</strong>r will<br />

not be able <strong>to</strong> comprehend the message. Thus, the message always<br />

remains protected using public key encryption.<br />

Public key encryption comes with its own share of drawbacks; speed<br />

being the most critical. The keys used are much longer than symmetric<br />

encryption, hence encryption overhead is much higher and performance<br />

decreased.<br />

Among the most popular algorithms available for public key<br />

encryption is RSA, created by RSA Data Security, which uses key<br />

lengths from 512 <strong>to</strong> 1024 bits.<br />

Secret<br />

Message<br />

„ f<br />

Encryption<br />

«iith<br />

Company A Public Key<br />

of Gompany B<br />

Decryption<br />

with<br />

Figure 10.3. — Public key encryption<br />

Secret<br />

Message<br />

_ p<br />

Private Key company B<br />

of Company B

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!