Page 247 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 247

Unit 14: Authentication




          different key with each individual person. As long as the private key remains secret, the public key   Notes
          can be given to any number of people and used securely. The ability to use a single key pair with
          many people represents a major breakthrough in cryptography because it makes cryptography
          substantially more usable by significantly lowering the key management requirements. A user
          can share one key pair with any number of people rather than having to establish a single secret
          key with each person.

          14.4.2 Putting Public Key Cryptography Together with Message Security

          Public key cryptography  is a fundamental element of message security. Without public key
          cryptography, it is doubtful that there would be practical message security solutions, due to
          the fact that key management before public key cryptography  was cumbersome.  With an
          understanding of the basic concepts of public key cryptography, the next step is to learn how
          those concepts work to make message security possible.

          14.4.3 Public Key Cryptography and Digital Signatures

          The reciprocal nature of the relationship of the key pair makes this unique identification possible
          through public key cryptography.
          Because the private key in a key pair belongs to only one party, any time that it is shown that
          the private key has been used, it can be concluded that only the owner of that key has used it.
          In this way, the use of the private key is like a signature on a paper because only the owner of a
          signature can actually make it. The signature confirms its owner's presence just as the use of the
          private key confirms its owner's presence.
          If a key pair is successfully used in an encryption and decryption operation, the pair's private key
          must have been used for one part of the operation. Because a public key is tied to only one private
          key, the corresponding public key can be used to identify its related private key and only its
          related private key. If a particular public key is used successfully in an encryption and decryption
          operation, it can be inferred that the corresponding private key was used for one part of the
          operation. Because only the key owner can use the private key, this means that the key owner
          and only the key owner could have performed part of the encryption and decryption operation.
          Using a private key to establish identity shows that the full encryption and decryption operation
          was accomplished successfully. Showing a full operation means that plaintext would have to
          be encrypted to ciphertext using a private key and then decrypted back to plaintext using the
          corresponding public key. If this operation is successfully shown, the use of the private key, and
          only the private key, is demonstrated.
          To show a successful encryption and decryption operation, the plaintext before the encryption and
          decryption operations must match the plaintext after the encryption and decryption operation.
          Both sets of plaintext must be compared directly and shown to match absolutely. There must be
          a control that is used for comparison and validation.
          In e-mail, this control is the actual message. Because the message is available to both the sender
          and the recipient, it is a convenient control element.

          To be used in this comparison operation, the message is converted into a "hash," which is a
          numerical representation of the complete text. Identical message text will yield identical hash
          values.

          By taking the hash value of the message and combining it with the private key at the time of
          sending, the owner of the private key proves that he or she, and only he or she, sent the message.
          Combining the message with the private key is accomplished by encrypting  the hash value
          with the  sender's  private key, which  creates  the actual  digital signature. Depending on  how




                                           LOVELY PROFESSIONAL UNIVERSITY                                   241
   242   243   244   245   246   247   248   249   250   251   252