03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Public key cryptography involves the use of different keys for encrypting and<br />

decrypting functions. If you encrypt something with key 1, you can only decrypt it<br />

with key 2, as shown in Figure 2-4.<br />

Key 1 Key 2<br />

Plaintext Encryption Ciphertext Decryption Plaintext<br />

Figure 2-4 Public key concept<br />

This architecture allows the use of one of the keys as a private key. This means<br />

that nobody can have access to this key except the owner. The other key can be<br />

used as a public key. If a user wants to send an encrypted message to another<br />

person, he or she will get the other person‘s public certificate, encrypt the<br />

message and send it. The message can be decrypted only by the owner of the<br />

private key.<br />

1<br />

2<br />

3<br />

Alice<br />

Plain text<br />

B<br />

public<br />

Encrypted text<br />

B<br />

private<br />

Plain text<br />

Bob<br />

Alice<br />

Plain text<br />

A<br />

private<br />

Encrypted text<br />

A<br />

public<br />

Plain text<br />

Bob<br />

Figure 2-5 Using private key cryptography<br />

Figure 2-5 shows a sample communication between two persons: Alice and Bob.<br />

1. Alice wants to communicate with Bob but she does not want anybody to read<br />

the messages. She will use Bob‘s public key to encrypt the message.<br />

2. Alice sends the message to Bob.<br />

3. Bob uses his private key to decrypt the message.<br />

Chapter 2. <strong>Security</strong> fundamentals 13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!