Page 240 - DCAP403_Operating System
P. 240

Unit 12: Security Solution




          no longer important and can be discarded. Both the public and the private keys are needed for   Notes
          encryption /decryption but only the owner of a private key ever needs to know it. Using the RSA
          system, the private key never needs to be sent across the Internet.
          The private key is used to decrypt text that has been encrypted with the public key. Thus, if I

          send you a message, I can find out your public key (but not your private key) from a central
          administrator and encrypt a message to you using your public key. When you receive it, you
          decrypt it with your private key. In addition to encrypting messages (which ensures privacy),
          you can authenticate yourself to me (so I know that it is really you who sent the message) by

          using your private key to encrypt a digital certificate. When I receive it, I can use your public key
          to decrypt it. A table might help us remember this.
           To do this                                       Use whose        Key
           Send an encrypted message                        Use the receiver’s  Public key
           Send an encrypted signature                      Use the sender’s   Private key
           Decrypt and encrypted message                    Use the receiver’s   private key
           Decrypt an encrypted signature (and authenticate the sender)  Use the sender’s   Public key

          12.8 Comparison between Symmetric and Public Key Encryption


          12.8.1 Symmetric Key Encryption

          Symmetric cryptography involves a single, secret key, which both the message-sender and the
          message-recipient must have. It is used by the sender to encrypt the message, and by the recipient
          to decrypt it.
          Symmetric cryptography provides a means of satisfying the requirement of message content
          security, because the content cannot be read without the secret key. There remains a risk exposure,
          however, because neither party can be sure that the other party has not exposed the secret key to
          a third party (whether accidentally or intentionally).
          Symmetric cryptography can also be used to address the integrity and authentication requirements.
          The sender creates a summary of the message, or ‘message authentication code (MAC)’ encrypts
          it with the secret key, and sends that with the message. The recipient then re-create the MAC,
          decrypts the MAC that was sent, and compares the two. If they are identical, then the message
          that was received must have been identical with that which was sent.

          A major difficulty with symmetric schemes is that the secret key has to be possessed by both
          parties, and hence has to be transmitted from whomever creates it to the other party. Moreover, if
          the key is compromised, all of the message transmission security measures are undermined. The
          steps taken to provide a secure mechanism for creating and passing on the secret key are referred
          to as ‘key management’.
          The technique does not adequately address the non-repudiation requirement, because both
          parties have the same secret key. Hence the other, and a claim by either party not to have sent a
          message is credible, because the other may have compromised the key expose each to the risk of

          fraudulent falsification of a message.
          12.8.2 Public Key Cryptography (Encryption)

          Whereas symmetric cryptography has existed, at least in primitive forms, for 2,000 years
          asymmetric approaches were only invented in the mid-1970s.
          Public key cryptography involves two related keys, referred to as a ‘key-pair’, one of which only
          the owner knows (the ‘private key’) and the other which anyone can know (the ‘public key’).




                                           LOVELY PROFESSIONAL UNIVERSITY                                   233
   235   236   237   238   239   240   241   242   243   244   245