Page 250 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 250

Wireless Networks




                    Notes          be used on the entire message. It needs to be part of the process that "locks" and "unlocks" the
                                   information. As long as the message is unreadable until the private key is presented, the goal of
                                   message encryption is met.
                                   As noted in "How Public Key Cryptography Works" earlier in this topic, public keys use strong
                                   algorithms to compensate for being publicly known. These strong algorithms mean that they
                                   are larger, and thus computations that use them are slower, than the older symmetric keys.
                                   Because a private key is only used to unlock information before it is viewed, and not on the
                                   entire message, it is more economical to use a key pair on as little information as possible and use
                                   a faster, symmetric key on as much information as possible while ensuring that the information
                                   cannot be used until the private key is presented.
                                   Symmetric keys use a secret key, which both parties must know. This process is sometimes called
                                   "key negotiation." With key pairs, there is no key negotiation because one public key can be used
                                   by many people. Key pairs can also be used in conjunction with symmetric keys to handle key
                                   negotiation. A symmetric key can be chosen and that key can be encrypted, using the public key
                                   of a key pair, and sent to the owner of the private key. When sending to multiple recipients, the
                                   same symmetric key can be used for all recipients, and then encrypted using the public key of
                                   each specific recipient. Because only the private key owner can decrypt the symmetric key, the
                                   symmetric key remains a secret shared among authorized people. You can generate symmetric
                                   keys for a one-time use during a particular operation or session. These are referred to as "session
                                   keys". Public key encryption can enhance rather than replace symmetric key encryption.

                                   The goal of message encryption is to ensure that a message is unreadable until the private key
                                   is presented. The private key can be used in symmetric key negotiation to securely transmit a
                                   symmetric key. Because a symmetric key can be securely transmitted to a recipient, you can use a
                                   symmetric key to encrypt a message and then encrypt that symmetric key using the public key in a
                                   key pair. Only the private key holder can unlock the symmetric key, which is then used to decrypt
                                   the message. This operation functions as if the entire message had been encrypted and decrypted
                                   using the key pair. However, because it uses a faster, symmetric key on most of the information,
                                   the operation is faster than it would otherwise be. Throughout this process, the message remains
                                   protected until the presentation of the private key, thus providing confidentiality, which is the
                                   fundamental service of message encryption. Because of the encryption and decryption process,
                                   any alteration of a message after it has been encrypted will cause the decryption operation to fail,
                                   providing for data integrity.
                                   Although  the  use  of  a  symmetric  key  may  be  unexpected  and  its  benefit  not  immediately
                                   obvious,  it enhances  message  security by making the process  of message  encryption faster
                                   without sacrificing the security of the message. The following figure 14.14 shows the sequence of
                                   encrypting with the supporting elements of public key cryptography.

                                                  Figure 14.14: Sequence of Encrypting Public Key Cryptography




















                                   Source: http://technet.microsoft.com/en-us/library/aa998077(v=exchg.65).aspx


          244                              LOVELY PROFESSIONAL UNIVERSITY
   245   246   247   248   249   250   251   252   253   254   255