12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Symmetric vs. Asymmetric CryptographySay that Jim sends Maria a message that only Maria will be able toread. Both Jim and Maria have a private key but Jim does not knowMaria’s private key and Maria does not know Jim’s. They also have apublic key that is available on a public server containing the public keyrepository. Jim queries the repository to obtain Maria's public key anduses it with his own private key to encrypt the message. The messageis sent to Maria and she then retrieves Jim's public key. Using the combinationof Jim's public key and her private key, she can then decryptthe message and read it.Bob is a bad guy and he intercepts the message between Jim andMaria. Since Bob does not know either Maria or Jim’s private key, he isunable to decrypt the message even if he has Maria and Jim's publickeys. Figure 27 illustrates this example.InternetPublic keyrepositoryPublic KeysName: Key:Jim JhiGhr*7km893Maria %re84_)Kflg@Bob Di*fi$3Lkvl#?kdfVictoria M_c&ll$mvoMk!. . . . . .Message encryptedwith Maria’s public keyand Jim’s private keyMessage decryptedwith Jim’s public keyand Maria’s private keyJim’s private key:ii8re8*^mf

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!