22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1.4.5 Digital signatures<br />

There is one further advantage that asymmetric key algorithms give us.<br />

In the previous example, imagine that Alice uses her private key to encrypt a<br />

message and sends it to Bob. The message that is sent between them is still<br />

scrambled, but it is no longer private, because anyone with the public key can<br />

decrypt it (and we have said that we do not care who has the public key).<br />

So, what can we use this message from Alice for? The answer is: authentication.<br />

Because only Alice has access to the private key that created the message, it<br />

can only have come from her. This is the concept of digital signatures.<br />

Digital signatures are concerned with providing integrity, authentication and<br />

identification, and non-repudiation, whereas the symmetric and asymmetric key<br />

algorithms we have discussed thus far were only concerned with confidentiality.<br />

Hash functions<br />

In order to provide these additional services, we need to introduce a new kind of<br />

cryptographic algorithm: hash functions (also called message digests).<br />

Where you can encrypt and decrypt with symmetric and asymmetric key<br />

algorithms, hash functions only encrypt. This is why they are commonly referred<br />

to as one-way functions. You can never re<strong>cover</strong> the original message from a<br />

hash function.<br />

Also, hash functions are called “functions” because they take an input message<br />

and produce an output. More precisely, they are used to index the original value<br />

or key of a message or a block of data, and then are used later each time the<br />

data associated with the value or key is to be retrieved. A secure hash function<br />

has three main attributes:<br />

1. It takes a message of any size and generates a small, fixed size block of data<br />

from it (called a message digest). Re-executing the hash function on the<br />

same source data will always yield the same resulting digest. This is called<br />

the fingerprint of the message.<br />

2. It is not predictable in operation. That is to say, a small change in the source<br />

message will have an unpredictably large effect on the final digest. Put<br />

another way, even changing a single bit of the message changes half the bits<br />

of the output, if you are using a good hash function.<br />

3. It is, for all intents and purposes, irreversible. In other words, there is no way<br />

to derive the source data, given its digested form.<br />

Chapter 1. Fundamentals of IT security 35

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!