22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

22 Lotus Security Handbook<br />

In general, non-repudiation applies to the transmission of electronic data, such<br />

as an order to a stock broker to buy/sell stock, a doctor's order for medication to a<br />

specific patient, or approval to pay an invoice by a company to its bank.<br />

The overall goal is to be able to verify, with virtually 100% certainty, that a<br />

particular message can be associated with a particular individual, just as a<br />

handwritten signature on a bank check is tied back to the account owner.<br />

1.4 Cryptographic techniques<br />

1.4.1 Cryptography<br />

Security mechanisms, be they those contained in vendor products or Internet<br />

standards, make use of a number of common cryptographic techniques. It is<br />

important to have a good understanding of these techniques and, in general,<br />

throughout the book we assume that the reader has some basic knowledge of<br />

them.<br />

While this is a complex area, which encompasses many different and intricate<br />

facets, we’ve made an effort in this section to distill that information and present<br />

a brief overview of the important cryptographic techniques. We believe that this is<br />

a useful resource and we urge the reader not to skip it.<br />

After defining cryptography, we take a look at the following areas related to<br />

cryptographic techniques:<br />

► Symmetric key (or bulk) encryption<br />

► Public key encryption<br />

► Secure hash (or digest) functions<br />

► Digital signatures and other combinations of the above techniques<br />

► Certification mechanisms<br />

To reiterate, cryptography—its techniques, applications, laws, and the<br />

mathematics behind it—is a broad and complex subject, and it is not the goal of<br />

this redbook to be a comprehensive discussion of it. Instead, we suggest that the<br />

reader wanting to know more about this topic consult the document “RSA<br />

Laboratories' Frequently Asked Questions About Today's Cryptography, Version<br />

4.1”, which is available online at the following URL:<br />

http://www.rsasecurity.com/rsalabs/faq/<br />

Before we talk about the techniques, let’s first define what cryptography is.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!