22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

its for RSA and 160 bits for ECC, corresponding to a symmetric block cipher<br />

key size of 80 bits. NIST has published a list of recommended elliptic curves<br />

for protection of 5 different symmetric keysizes (namely, 80, 112, 128, 192,<br />

and 256).<br />

Advantages of asymmetric key algorithms<br />

As we have shown, there are a number of asymmetric key algorithms in use. In<br />

addition to those already mentioned, we <strong>cover</strong> those used in Notes, Domino, and<br />

other Lotus collaboration products later in this book. For now, let’s talk about the<br />

advantages that all asymmetric key algorithms share in common.<br />

Asymmetric key algorithms offer easier administration of the keys since there is<br />

no need to find a secure channel to get a copy of the key to the intended<br />

recipient. The private key stays private and the public key is public. In other<br />

words, the big advantage of this mechanism over the symmetric key mechanism<br />

is that there is no longer any secret to share. In fact, it does not matter who has<br />

the public key, because it is useless without the matching private key.<br />

Another major advantage of asymmetric key algorithms is that they can provide<br />

digital signatures that cannot be repudiated. We discuss that in a later section.<br />

Disadvantages of asymmetric key algorithms<br />

The disadvantage of asymmetric key algorithms is that they are very slow. In<br />

contrast, there are many secret-key encryption methods that are significantly<br />

faster than any currently available public-key encryption method. This is because<br />

of the fact that you need large key lengths to get comparable security of smaller<br />

symmetric keys.<br />

1.4.4 The hybrid algorithm<br />

An asymmetric key algorithm can be used with a symmetric key algorithm to get<br />

the best of both worlds. For encryption, the best solution is to combine both types<br />

of algorithms in order to get both the security advantages of asymmetric key<br />

algorithms and the speed advantages of symmetric key algorithms.<br />

Thus, this is a hybrid solution which uses a symmetric key for data encryption,<br />

and asymmetric keys for symmetric key encryption. Such a marriage is called a<br />

digital envelope.<br />

In addition, the symmetric key is generally generated every time and is called a<br />

“session” key. It is valid the whole time two people are exchanging messages<br />

with each another. This protocol is used in almost all “public key encryption” such<br />

as Notes, SSL, S/MIME. It provides fast performance and is easy to implement.<br />

Chapter 1. Fundamentals of IT security 33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!