Page 117 - CISSO_Prep_ Guide
P. 117

people that want to communicate must have a separate key that
            only they use. This requires the storage and distribution of many
            keys.

            Key distribution is also a challenge since there must be a secure
            way to share the symmetric key between the two parties without
            anyone else getting a copy. This means that the key cannot be
            sent in the same channel as the data but must rather be sent out
            of band or in some other distribution channel (courier, fax,
            phone).


            Asymmetric Algorithms

            Asymmetric Algorithms are a relatively recent development. In
            the 1970s, Diffie-Hellman developed a method of encryption
            based on two different keys. The two keys are mathematically
            related. One key is known as the private key; the other is known
            as the public key. It is not computationally feasible to learn the
            value of the private key even though a person knows the value
            of the public key. Therefore a person may freely and openly
            give their public to everyone without risking the compromise of
            their private key. Because asymmetric algorithms use a public
            and private key pair, they are commonly referred to as public-
            key algorithms.

            The main use of most asymmetric algorithms is to support the
            implementation of symmetric key algorithms and for digital
            signatures, which will be examined later.

            Diffie-Hellman was used to allow two parties that wanted to
            communicate over an untrusted network to establish a secret key
            that could be used for symmetric (fast) encryption. Therefore it
   112   113   114   115   116   117   118   119   120   121   122