13.07.2015 Views

ericssonhistory.com

ericssonhistory.com

ericssonhistory.com

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 3Use of encryption and message authenticationcode (MAC) to protect a messagefrom eavesdropping and ensure messageintegrity.An example of a popular public key systemis the Rivest-Shamir-Adleman (RSA)system, which encrypts a message by interpretingit as a sequence of large integers thatare transformed via modular arithmetic.Throughput is in the kbit/s tange. Popularsymmetric systems include the data encryptionstandard (DES, Box B) and RC5.These systems, which belong to a categoryknown as block ciphers, encrypt at a rate ofseveral Mbit/s by dividing messages intoblocks, and using very efficient "bitfiddling"operations on each block. Themost efficient symmetric systems—calledstream ciphers—produce an "infinite"pseudo-random bit stream that is <strong>com</strong>binedor added to the message, bit by bit. Examplesof stream ciphers are RC4 and A5/1 (theencryption system used in GSM).In practice, a good cryptographic systemmakes it impossible for an outsider to readthe content of messages. However, encryptiondoes not protect data packets from beingmodified. For example, let us assume that apacket consists of one bit of data—"0" or" 1"—which corresponds to an encrypted "0"or "1" message. By changing the packet,someone could also change the message.Message authentication codesObviously, an integrity mechanism is neededto protect packets. The addition of a messageauthentication code (MAC) field enablesrecipients to detect whether or not any packetshave been modified. A MAC field is a sequenceof bits added to the original message.Modifications are detected by <strong>com</strong>paring thereceived MAC field with a checksum that isderived from the received message and a secretkey. If the output matches the teceivedMAC field, then the message is accepted asbeing authentic. Several MAC algorithmsexist. The one most <strong>com</strong>monly used in theInternet is the HMAC algorithm (Figure 3).A related security mechanism is the digitalsignature, which serves the same purposeas a MAC. However, whereas the MACcan only be verified by the intended recipient,a digital signatute can (in principle) beconfirmed by anyone. Keeping the terminologydefined above, a MAC is a symmetrictechnique, and a digital signature isasymmetric. Accordingly, in contrast to aMAC, a digital signature can give nonrepudiation;that is, if only one individualknows the secrer key, then no one but thatperson can have sent or used it.Ericsson Review No. 2, 2000 99

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!