26.10.2012 Views

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ELECTRONIC MAIL SECURITY: PGP, S/MIME 307<br />

Instead of using RSA for key encryption, PGP may use a variant of Diffie–Hellman<br />

(known as ElGamal) that does provide encryption/decryption. In order for the encryption<br />

time to reduce, the combination of conventional and public-key encryption is used in<br />

preference to simply using RSA or ElGamal to encrypt the message directly. In fact,<br />

CAST-128 and other conventional algorithms are substantially faster than RSA or ElGamal.<br />

Since the recipient is able to recover the session key that is bound to the message,<br />

the use of the public-key algorithms solves the session key exchange problem. Finally,<br />

to the extent that the entire scheme is secure, PGP should provide the user with a range<br />

of key size options from 768 to 3072 bits.<br />

Both digital signature and confidentiality services may be applied to the same message.<br />

First, a signature is generated from the message and attached to the message. Then the<br />

message plus signature are encrypted using a symmetric session key. Finally, the session<br />

key is encrypted using public-key encryption and prefixed to the encrypted block.<br />

9.1.2 Authentication via Digital Signature<br />

The digital signature uses a hash code of the message digest algorithm, and a public-key<br />

signature algorithm. Figure 9.2 illustrates the digital signature service provided by PGP.<br />

The sequence is as follows:<br />

• The sender creates a message.<br />

• SHA-1 is used to generate a 160-bit hash code of the message.<br />

• The hash code is encrypted with RSA using the sender’s private key and a digital<br />

signature is produced.<br />

• The binary signature is attached to the message.<br />

• The receiver uses RSA with the sender’s public key to decrypt and recover the<br />

hash code.<br />

• The receiver generates a new hash code for the received message and compares it<br />

with the decrypted hash code. If the two match, the message is accepted as authentic.<br />

The combination of SHA-1 and RSA provides an effective digital signature scheme.<br />

As an alternative, signatures can be generated using DSS/SHA-1. The National Institute<br />

M<br />

KS a<br />

Sender A Receiver B<br />

H Ep Z −1<br />

EKSa [H(M)]<br />

Z Z<br />

M<br />

E KSa [H(M)]<br />

Figure 9.2 PGP authentication computation scheme using compression algorithm.<br />

M<br />

KP a<br />

D p<br />

H<br />

?<br />

=<br />

YES<br />

NO<br />

Authentic<br />

Failed

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!