Page 251 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 251

Unit 14: Authentication





          z z  Message is captured.                                                             Notes
          z z  Recipient's public key is retrieved.
          z z  One-time symmetric session key is generated.
          z z  Encryption operation is performed on the message using the session key.
          z z  Session key is encrypted using the recipient's public key.
          z z  Encrypted session key is included with the encrypted message.
          z z  Message is sent.
          The following figure 14.15 shows the sequence of decrypting with the addition of the supporting
          elements of public key cryptography.

                           Figure 14.15: Sequence of Decrypting Public Key Cryptography









          Source: http://technet.microsoft.com/en-us/library/aa998077(v=exchg.65).aspx

          z z  Message is received.
          z z  Encrypted message and encrypted session key are retrieved from the message.
          z z  Recipient's private key is retrieved.
          z z  Session key is decrypted with the recipient's private key.
          z z  Message is decrypted with decrypted session key.
          z z  Unencrypted message is returned to the recipient.
          The sequence shows how public key cryptography provides support for the core services of
          message encryption: confidentiality and data integrity.

          14.4.5 Understanding How Public Key Cryptography in Digital Signatures
          and Message Encryption Work Together

          Digital signatures and message encryption are complimentary services. After considering how
          public key cryptography integrates with each service individually, it is helpful to consider how
          these services are used together.
          The following figure 14.16 shows the sequence of signing and encrypting with the addition of the
          supporting elements of public key cryptography.

          z z  Message is captured.
          z z  Hash value of the message is calculated.
          z z  Sender's private key is retrieved.
          z z  Recipient's public key is retrieved.
          z z  Hash value is encrypted with the sender's private key.
          z z  Encrypted hash value is appended to the message as a digital signature.
          z z  One-time symmetric session key is generated.
          z z  Encryption operation is performed on a message using the session key.
          z z  Session key is encrypted using the recipient's public key.


                                           LOVELY PROFESSIONAL UNIVERSITY                                   245
   246   247   248   249   250   251   252   253   254   255   256