22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

26 Lotus Security Handbook<br />

Symmetric key algorithm example<br />

Let’s take a moment to show how symmetric encryption works. For this, we’ll<br />

need to introduce a couple of characters that have been traditionally used when<br />

explaining security concepts.<br />

Normally, one would use A, B, and C to diagram the flow of information between<br />

two points. However, since this flow of information involves people, it’s best to<br />

give them normal names. So, Alice and Bob are the two characters we’ll use for<br />

examples from now on. The cast of characters expands as the need dictates, but<br />

for now, let’s concentrate on Bob and Alice.<br />

These characters have been used for years to provide examples of how<br />

encryption techniques work, and, as with many long-lived fictitious characters,<br />

Bob and Alice have an amusing biography. This biography can be found in a<br />

document titled “The Alice and Bob after-dinner speech”, given at the Zurich<br />

Seminar in April 1984 by John Gordon. The document can be found on line at the<br />

following URL:<br />

http://www.conceptlabs.co.uk/alicebob.html<br />

So, on to our example with Bob and Alice. Let’s say that Alice wants to send Bob<br />

a message and Alice wants this message to be sent securely and wants to<br />

ensure also that only Bob can read it. Figure 1-4 illustrates this example, with the<br />

exchange going from left to right.<br />

"THINK" "THINK" M0B4Q4Rg2s M0B4Q4Rg2s "THINK"<br />

plaintext encrypt<br />

cyphertext<br />

Figure 1-4 Symmetric key algorithm example<br />

decrypt<br />

Alice key<br />

Bob<br />

key<br />

plaintext<br />

In our example, here is what happens:<br />

1. Alice's message is encrypted using a private key.<br />

2. Bob receives Alice's encrypted message, sees that it is encrypted and wants<br />

to read it.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!