Page 80 - DCAP306_DCAP511_E-COMMERCE_AND_E-BUSINESS
P. 80

Unit 6:  Security Framework



               Figure 6.2 depicts asymmetric cryptosystems algorithm 1.

                                      Figure 6.2: Asymmetric Cryptosystems Algorithm 1




















               Source: Bajaj. K., Nag. D. (1999). E-Commerce Security Issues. New Delhi:  Tata McGraw-Hill Publishing Company
               Limited. Page 204.
               Figure 6.3 depicts asymmetric cryptosystems algorithm  2. Suppose user1 has to authenticate user2
               about the transmitted information, then information is encrypted using user1’s private key (user1PRK).
               The encrypted information is then decrypted at the receiving end using user1’s public key (user1PUK).
               The user1 protects the private key thereby, authenticating the acknowledgement sent to user2.

                                      Figure 6.3: Asymmetric Cryptosystems Algorithm 2
















               Source: Bajaj, K., and Nag, D. (1999). E-Commerce Security Issues. New Delhi: Tata McGraw-Hill Publishing
               Company Limited. Page 204.
               The RSA Algorithm
               RSA algorithm is a cryptosystem that uses public key for achieving confidentiality and authenticity of
               the information. It was developed by Ron Rivest, Adi Shamir, and Len Adleman in the year 1978.
               Let a and b be two prime numbers. The result of their product is assigned to L.
               L=a*b

               Two random numbers p and q are chosen from the product of two prime numbers - (a-1) * (b-1).
               Both p and q are relatively prime to (a-1) and (b-1), i.e., both a and b do not have any common factors
               with p and q.
               Now, p and q are written as:
               pq= 1 mod (p-1)(q-1)

               Here,




                                    LOVELY PROFESSIONAL UNIVERSITY                           73
   75   76   77   78   79   80   81   82   83   84   85