Page 220 - DCAP403_Operating System
P. 220

Unit 11: System Security





          Box 11.2 shows a PGP encrypted message (PGP compresses the file, where practical, prior to   Notes
          encryption because encrypted files lose their randomness and, therefore, cannot be compressed).

          In this case, public key methods are used to exchange the session key for the actual message
          encryption using secret-key cryptography. In this case, the receiver’s e-mail address is the
          pointer to the public key in the sender’s keyring; in fact, the same message can be sent to multiple

          recipients and the message will not be significantly longer since all that needs to be added is the
          session key encrypted by each receiver’s private key. When the message is received, the recipient
          must use their private key to extract the session secret key to successfully decrypt the message
          (Box 11.3).

                                    Box 11.3: The Decrypted Message
             Hi Gary,


              “Outside of a dog, a book is man’s best friend.
              Inside of a dog, it’s too dark to read.”


              Carol
          It is worth noting that PGP was one of the first so-called “hybrid cryptosystems” that combined

          aspects of SKC and PKC. When Zimmermann was first designing PGP in the late-1980s, he wanted

          to use RSA to encrypt the entire message. The PCs of the days, however, suffered signifi cant
          performance degradation when executing RSA so he hit upon the idea of using SKC to encrypt
          the message and PKC to encrypt the SKC key.
          PGP went into a state of flux in 2002. Zimmermann sold PGP to Network Associates, Inc. (NAI)

          in 1997 and himself resigned from NAI in early 2001. In March 2002, NAI announced that they
          were dropping support for the commercial version of PGP having failed to find a buyer for the

          product willing to pay what NAI wanted. In August 2002, PGP was purchased from NAI by PGP
          Corp. Meanwhile, there are many freeware versions of PGP available.

          11.6 User Authentication

          A user authentication method includes the steps of: inputting, by a user, a predetermined
          password having a plurality of digits; examining whether an input password includes an actual
          password that is predetermined by using less digits than the input password; authenticating the
          input password if the input password includes the actual password; and refusing to authenticate
          the input password if the input password does not include the actual password.
          The user authentication method using the password is very useful for reinforcing the security
          by applying a simple processing, not necessarily consuming high costs and much time. Further,
          even when the password may be exposed to others, it is still safe. Also, although a password may
          be used in many cases in common, the security still can be reinforced by differentiating the input
          password. Most of all, the user can remember the actual password very easily, and yet get the
          same effect with changing the password.
          In a wired, switched network, the policy that controls what traffic an authenticated user can

          send and receive is typically based on the port through which the user is connected rather than
          on the user’s identity. This works when only one user is connected via a given port. Also, where
          physical barriers (locked doors, cardkeys etc.) are used to control access, it can be assumed that a
          user who has physical access to a port is authorized to connect on that port.
          When wireless access enters the picture, the identity of the user becomes crucial. Since multiple
          users can connect through a single wireless access point, the assumption of one user per port
          is no longer valid, and port-based access policies do not work. All sorts of users – visitors,



                                           LOVELY PROFESSIONAL UNIVERSITY                                   213
   215   216   217   218   219   220   221   222   223   224   225