Page 239 - DCAP403_Operating System
P. 239

Operating System




                    Notes          The DES algorithm is well known. However, since the key is only 56 bit long, there is some
                                   concern about security of data. A modification to DES is triple-DES and this improves the security

                                   aspects considerably.
                                   12.6 Triple—DES

                                   To strengthen DES, the DES encryption and decryption are done three times using either two
                                   keys or three keys as shown in Figure 12.4.
                                                      Figure 12.4: 2 and 3 key DES Encryption Algorithm


                                               Plain text                                  Plain text






                                            Encrypt with key 1                          Encrypt with key 1






                                            Encrypt with key 2                          Encrypt with key 2





                                            Encrypt with key 3                          Encrypt with key 3

                                           3 Key DES encryption                        3 Key DES encryption



                                               Cipher text                                 Cipher text




                                   12.7 RSA System

                                   RSA is an Internet encryption and authentication system that uses an algorithm developed in 1977
                                   by Ron Rivest, Adi Shamir, and Leonard Adleman. The RSA algorithm is the most commonly
                                   used encryption and authentication algorithm and is included as part of the Web browsers
                                   from Microsoft and Netscape. It’s also part of Lotus Notes, Intuit’s Quicken, and many other
                                   products. The encryption system is owned by RSA Security. The company licenses the algorithm
                                   technologies and also sells development kits. The technologies are part of existing or proposed
                                   Web, Internet, and computing standards.

                                   How the RSA System Works?

                                   The mathematical details of the algorithm used in obtaining the public and private keys are

                                   available at the RSA Web site. Briefly, the algorithm involves multiplying two large prime
                                   numbers (a prime number is a number divisible only by that number and 1) and through
                                   additional operations deriving a set of two numbers that constitutes the public key and another
                                   set that is the private key. Once the keys have been developed, the original prime numbers are



          232                              LOVELY PROFESSIONAL UNIVERSITY
   234   235   236   237   238   239   240   241   242   243   244