Page 237 - DCAP403_Operating System
P. 237

Operating System




                    Notes                                  Figure 12.2: Public-key Cryptography





































                                   Public key techniques are much more computationally intensive than purely symmetric
                                   algorithms. The judicious use of these techniques enables a wide variety of applications. In
                                   practice, public key cryptography is used in combination with secret-key methods for effi ciency
                                   reasons. For encryption, the sender encrypts the message with a secret-key algorithm using a
                                   randomly generated key, and that random key is then encrypted with the recipient’s public key.
                                   For digital signatures, the sender hashes the message (using a cryptographic hash function) and
                                   then signs the resulting “hash value”. Before verifying the signature, the recipient also computes
                                   the hash of the message, and compares this hash value with the signed hash value to check that
                                   the message has not been tampered with.




                                       Task    One key encodes the message and the other decodes it. Then why we use
                                     encryption techniques to encode and decode the message.


                                   12.5 Digital Encryption Standards (DES)



                                   The data encryption standard (DES) specifies a FIPS (Federal Information Processing Standards)
                                   approved cryptography algorithm. Encrypting data converts it to an unintelligible form called
                                   cipher. Decrypting cipher converts the data back to its original form called plaintext. The
                                   algorithm described in this standards specifies both enciphering and deciphering  operations

                                   which are based on a binary number called a key.
                                   A key consists of 64 binary digits (“O”s or “1”s )of which 56 bits are randomly generated and
                                   used directly by the algorithm. The other 8 bits, which are not used by the algorithm, are used
                                   for error detection. The 8 error detecting bits are set to make the parity of each 8-bit byte of the
                                   key odd, i.e. there is an odd number of “1”s in each 8-bit byte. Authorized users of encrypted
                                   computer data must have the key that was used to encipher the data in order to decrypt it.



          230                              LOVELY PROFESSIONAL UNIVERSITY
   232   233   234   235   236   237   238   239   240   241   242