Page 118 - CISSO_Prep_ Guide
P. 118
is known as the key agreement protocol. This is used in some
internet applications and in IPSEC.
Several rules can be used to remember how asymmetric
algorithms work. Remembering these rules can make the
understanding of asymmetric algorithms a lot easier.
The first rule is essential - that is:
The keys in an asymmetric algorithm only work as a pair. When
one key (one half of the key pair) is used to encrypt a message,
the other half of the key pair is the ONLY key that will
successfully decrypt the message.
Confidentiality
The use of other asymmetric algorithms has been to distribute
the secret symmetric key between two parties that wish to
communicate. This is in contrast to Diffie-Hellman that was
used to negotiate the secret symmetric key.
This can be done as follows: